CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD
|
|
|
- Loreen Bruce
- 10 years ago
- Views:
Transcription
1 CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD
2 Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers rely on their supply chains to ensure consumer choice, affordability, consistent quality of products and continuity of supply. Any supply chain, no matter how simple or complex, can present risks that need to be adequately managed. As the global supply system comes under increasing pressure from population increase, growing demand for limited resources and changing diets, companies also need to be alert to the potential for food fraud and actively work with their customers and suppliers to identify and mitigate the risks of food fraud. Food fraud is committed when food is deliberately placed on the market for financial gain, with the intention of deceiving consumers or customers. Although there are many kinds of possible food fraud, the Food Standards Agency (FSA) notes on its food fraud webpage two main types: the sale of food which is unfit and potentially harmful; and the deliberate misdescription of food. On top of the existing robust legislative frameworks, strengthening of intelligence sharing and analysis is key to minimising fraud and informing industry s own activity to maintain the assurance and integrity of its products and supply chains. FDF s support to its members on incident prevention and horizon scanning includes active engagement with members, with the FSA and Department for Environmental Food and Rural Affairs (Defra) and with retailers and other stakeholders in the UK, Europe and globally. This simple guide, which follows on from FDF s Guide on Sustainable Sourcing: Five Steps Towards Managing Supply Chain Risk, sets out a step-by-step process to help food and drink manufacturing businesses of all sizes protect their businesses from food fraud by helping them to identify, prioritise and manage upstream supply chain food authenticity risks. Alongside this guide, further resources are also available on the FDF website
3 Collect information to describe your supply chain on a product basis from a food authenticity perspective What is required to produce the product, e.g. ingredients, water, packaging, transport? Who are your immediate suppliers? Who supplies them? Think about suppliers all the way back to source. Are you changing a supplier or process? From which countries are key resources sourced and what do you know about them, e.g. are there any geopolitical issues? What are the critical resources for your business? What gives the product and its ingredients their value? What specific ingredient requirements do you have, e.g. organic, halal, geographical origin, fair trade On what basis do you buy the ingredients, e.g. are any traded on a specific property such as colour or nitrogen content? Have you considered seasonality of supply? KEY OUTCOME: MAP Use expertise from both within your business and outside, such as your trade association and other intelligence sharing networks, to help gather the relevant information Start by mapping major product categories i.e. those that are most critical for your business Gather information from suppliers to identify those who are most at risk, e.g. via questionnaire and supplier assurance and audit processes Create a visual and statistical map of your product supply chain
4 Understand the key risks and opportunities for food fraud in your supply chain Is anything that you are sourcing in short supply and/ or the subject of media or other concern? Have there been changes in the products, processes or supply chains your business depends on? Are your supplier assurance and audit systems fit for purpose? What are the risks to your business, market presence and reputation? Are there possibilities to do things differently (try to imagine the mindset of those who may seek to commit food fraud)? Is a supplier or potential supplier offering you a deal which seems too good to be true? Can you identify any other changes to the ingredients, processes or supply chains that can constitute a risk? Does your own production process add any further risks? KEY OUTCOME: UNDERSTANDING KEY RISKS AND Make sure you are aware of the main factors which may impact on your supply chains (ie economic and seasonal variables) Identify resources that could be the target of fraud because of their value or associated sensitivities Think about key materials and whether there is any history of authenticity problems Conduct scenario planning: consider the risk if certain resources were to become unavailable or to be substituted Gather information from suppliers on identified supply chain risks, including whether they have action plans in place Include in your risk assessment information from other sources, such as your trade association and other intelligence sharing networks Continuously monitor in real-time for changes to risks in the supply chain, e.g. environmental and economic changes which may affect supply chain
5 ASSESS AND Analyse how your business can manage food authenticity related risks and take advantage of opportunities to limit food fraud What are your key risks and who are the associated suppliers? Have you prioritised supplier risk separately, e.g. type of supply chain, direct or indirect suppliers, outsourced? How well do you know your suppliers, e.g. how long have you been dealing with them and what is their track record like? How can you learn more about them, e.g. partnerships, supplier schemes? Are your processes for appointing new suppliers robust? Do you have full visibility of your supply chain? Ensure strong links between procurement and regulatory/ technical teams to help monitor and assess the key risks and potential opportunities for food fraud Ensure you are using your supplier assurance and audit systems to help you to assess and prioritise supplier risk To help assess risks, make the most of external sources of information, e.g. your trade association Create a risk matrix (e.g. changes in regulatory requirements, supply and demand imbalances, resilience of supply chain and documented cases of fraud) to help with prioritisation Assess what is business essential Make sure you know what you are buying, have agreed specifications and have monitoring and compliance checks in place In your supplier assurance systems, be aware of the need to keep under scrutiny the possibility of your suppliers outsourcing to third parties KEY OUTCOME: IMPROVED KNOWLEDGE ON HOW TO MANAGE RISKS AND
6 Define a set of actions to reflect the risk of food fraud and prioritise the opportunities to limit it already established How can the identified risks be mitigated? What measures are feasible to address the priority risks? Who is responsible for delivering the different parts of the plan? How can you get support from senior management to address these actions and incorporate them into company strategy? How best can you involve your suppliers? What are your success criteria? Consider the effectiveness of your chosen supplier assurance systems in limiting the opportunities for food fraud and mitigating the risk from authenticity issues (including prioritisation of supplier risks) Consider the role of authenticity testing Set up internal communications to explain why you are doing this and what is expected of colleagues (let all know that their views and observations are welcome) Set up meetings with suppliers about the risks you have prioritised and explain what you would like to achieve Ensure senior management sign-off of the company s strategy. Consider using external expertise, particularly to address risks where you have no immediate solution KEY OUTCOME: ACTION PLAN BASED ON KEY RISKS AND
7 Ensure action is taken, progress tracked, and communicated What is required to implement the action plan with suppliers? How best can you measure and report progress to senior management and across the broader organisation? Consider integrating relevant parts of the action plan into your supplier assurance and audit systems Agree a timetable for reviewing the action plan and regularly check it is on track Make sure all employees involved have the support and resources they need - consider any company training needs Consider broader internal communication and opportunities for external communications to enhance transparency and support Think of all five steps as a cyclical process that needs to be reviewed and repeated on a regular basis, as well as in response to substantial changes in the supply chain, to ensure that it remains current Continue to gather real-time data and horizon scan for substantial changes in the supply chain which should trigger a process review Implement the lessons learnt back into business operations, e.g. for new products and processes KEY OUTCOME: FULLY IMPLEMENTED ACTION PLAN INTEGRATED INTO THE BUSINESS
8 HELP FOR SMALL If you are a smaller business and don t know where to start, try answering a few basic questions first. - What are your key raw materials? - Where do they come from? - How resilient is their supply chain? - How do you protect your business from food fraud? ABOVE ALL THINK RISK AND PLAN AHEAD For further information, visit the FDF website
The Drinking Water Inspectorate s response to the Consultation on the Cave Review of competition and innovation in water markets
The Drinking Water Inspectorate s response to the Consultation on the Cave Review of competition and innovation in water markets This is Drinking Water Inspectorate s (DWI) response to the UK and Welsh
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Senior Project Manager A14 Cambridge to Huntingdon, Complex Infrastructure Programme Grade 6. Candidate Pack
Senior Project Manager A14 Cambridge to Huntingdon, Complex Infrastructure Programme Grade 6 Candidate Pack 2 Introduction The Highways Agency is an Executive Agency of the Department for Transport, and
HOME GROUP JOB DESCRIPTION. Date:
HOME GROUP JOB DESCRIPTION 1 JOB DETAILS Job Title: Assistant Finance Business Partner (Care & Support) Reports to: Finance Business Partne Date: Ref: HOMEJD235 2 JOB PURPOSE Based centrally this role
Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.
Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk [email protected] Reduce likelihood of attack Protect brand/ reputations Reassure customers
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
Updating Ofcom s guidance on network security
Updating Ofcom s guidance on network security Call for Inputs Publication date: 13 December 2013 Closing Date for Responses: 21 February 2014 Contents Section Page 1 Introduction 1 2 Legislative framework
Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING
Chapter 1 THE ROLE OF PURCHASING IN THE VALUE CHAIN The role and importance of the purchasing and supply function in the value chain. The difference between concepts such as ordering, buying, purchasing,
In partnership with. Food & Drink A fresh approach to risk management
In partnership with Food & Drink A fresh approach to risk management A thriving sector... In these difficult economic times the Food & Drink industry is a refreshing example of a sector that is expanding.
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
A BearingPoint Accelerator
> GRC A BearingPoint Accelerator Working closely with the client, we deliver a rigorous and effective integrated GRC (Governance, Risk and Compliance) solution one that is not only right for the client,
THE BUSINESS CASE FOR BUSINESS CONTINUITY MANAGEMENT SOFTWARE
THE BUSINESS CASE FOR BUSINESS CONTINUITY MANAGEMENT SOFTWARE When it comes to building a business continuity management (BCM) program that s complete, current, and compliant, there is no substitute for
Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence
Retail White Paper Driving Strategic Sourcing Effectively with Supply Market Intelligence About the Author Devaraj Chithur Devaraj is part of the Supply Chain group within Tata Consultancy Services (TCS)
Reliable supply chain information at your fingertips.
Supply-Line Reliable supply chain information at your fingertips. Services for professional procurement. Be better informed, make better decisions. Achilles Supply-Line - The cost effective supplier management
Helping to protect your business and your customers in the event of a data breach
Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
5-Day Mini MBA for the Oil and Gas Industry
5-Day Mini MBA for the Oil and Gas Industry www.mce-ama.com/2411 Mid-level Managers Days 5 www.mce-ama.com 1 WHY attend this programme? The world of Oil and Gas is dynamic and changing fast. This programme
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Incident Management in the Food Standards Agency. The Role of External Communications. Colin Houston Head of Incidents Unit
Incident Management in the Food Standards Agency The Role of External Communications Colin Houston Head of Incidents Unit How to report an incident Businesses and local and port health authorities can
ESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
Trust Board Report. Review of the effectiveness of the IM&T Committee
1. Introduction Trust Board Report Review of the effectiveness of the The meets every eight weeks, with a specific responsibility for governance, strategic direction, approval and direction of developments
Creating and Embedding a Customer Driven Supply Chain
To get there. Together. Creating and Embedding a Customer Driven Supply Chain Point of view Contents Creating and Embedding a Customer Driven Supply Chain 3 How to Embed a Customer Driven Supply Chain
Hospitality manager apprenticeship standard
Hospitality s work across a huge variety of organisations including bars, restaurants, cafés, conference centres, banqueting venues, hotels and contract caterers. These s generally specialise in a particular
Our risk management framework Reviewed quarterly by our executive committee
Our risk management framework Reviewed quarterly by our executive committee Our risk management framework helps us identify and mitigate risks. It is reviewed quarterly and updated to reflect changes particularly
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
Please contact me on 0207 213 4378 or [email protected] if you would like to discuss this further.
House of Commons Public Bill Committee, Scrutiny Unit, 7 Millbank, London, SW1P 3JA. 8 September 2014 Dear Sirs, Modern Slavery Bill call for written evidence We appreciate the opportunity to respond to
FSSC 22000 ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member
FSSC 22000 ASIA Event 11 November 2015 Tokyo Petra Wissenburg Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member Introduction to GFSI Food Fraud Mitigation 2 Introduction
Driving Operations through Better, Faster Decision Making
Driving Operations through Better, Faster Decision Making Driving Operations through Better, Faster Decision Making Operations faces increasing pressure from all sides. Picky customers know that your competitors
Shepway District Council Risk Management Policy
Shepway District Council Risk Management Policy Contents Section 1 Risk Management Policy... 3 1. Updates and amendments... 3 2. Definition... 3 3. Policy statement... 3 4. Objectives... 3 Section 2 Risk
Managing Supply Chain Impacts
Managing Supply Chain Impacts Increasing shareholder, public and media scrutiny means that any irregular or irresponsible practices within an organisation's supply chain can permanently damage an organisation's
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY VERSION 1.0 ISSUED JULY 2015 CONTENTS Page CONTENTS VERSION CONTROL FOREWORD i ii iii POLICY 1 Scope 1 Aim and Objectives 1 Methods and Standards 1
Business Continuity Planning
Business Continuity Planning Assistance for Young Enterprise Business Continuity Planning for small to medium-sized businesses This information will guide you through some steps that could help your business
Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager
Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant
FSA Consultation CP13/7: High level proposals for an FCA regime for consumer credit
FSA Consultation CP13/7: High level proposals for an FCA regime for consumer credit Response from the Consumer Finance Association Introduction The Consumer Finance Association (CFA) is the principal trade
How To Prevent Food Fraud
THE LATEST FRAUD DETECTION AND PREVENTION MODELS AND TOOLS Carole Payne A growing problem but will angst turn to action? What information should U.S. regulators seek and from what sources to help predict
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise
INCORPORATING SMALL PRODUCERS INTO FORMAL RETAIL SUPPLY CHAINS SOURCING READINESS CHECKLIST 2016
INCORPORATING SMALL PRODUCERS INTO FORMAL RETAIL SUPPLY CHAINS SOURCING READINESS CHECKLIST 2016 LSteinfield/Bentley University Authors: Ted London Linda Scott Colm Fay This report was produced with the
Business Continuity Management Policy
Business Continuity Management Policy Policy Holder: Authoriser: Caroline Gover, Head of Business Continuity Caroline Thomson, Chief Operating Officer Reviewed on: Feb 08 Reviewed on: Feb 08 Next Review
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
PROJECT MANAGEMENT FRAMEWORK
PROJECT MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Executive Assistant to
Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS) www.achilles.
Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS) www.achilles.com Improving supply chain management Increasing globalisation has
HEALTH, SAFETY, ENVIRONMENT AND COMMUNITY MANAGEMENT STANDARDS. OCTOBER 2011- ISSUE No 01. Doc No: HSEC MS 001
HEALTH, SAFETY, ENVIRONMENT AND COMMUNITY MANAGEMENT S OCTOBER 2011- ISSUE No 01 Doc No: MS 001 Introduction Celtique Energie is in the business of exploring for oil and gas in proven basins in Europe.
www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence
www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence PwC firms provide Industry-focused Assurance, Tax and Advisory services to enhance value for their clients. More than 161.000
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
THE COMPLETE GUIDE TO PERFECT PROJECT MANAGEMENT
THE COMPLETE GUIDE TO PERFECT PROJECT MANAGEMENT 1 CONTENTS Introduction 3 Prince2 5 Every as a project tool 6 Major development and building work 7 Further reading and information..9 2 THE COMPLETE GUIDE
Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer
Management of the Supply Chain: Excipients & APIs Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer 1.8 Quality Manual/Quality Policy Pfizer has integrated much of the supply chain Quality elements
HARLOW COUNCIL PERFORMANCE MANAGEMENT FRAMEWORK
HARLOW COUNCIL PERFORMANCE MANAGEMENT FRAMEWORK July 2013 1 P age Contents Page 1.0 Definition 3 2.0 Context 3 3.0 Purpose and aim of the policy 4 4.0 Policy Statement 4 5.0 Framework for Performance Management
HSMS. Group Health AND Safety Management System
3 2 CONSULTATION AND EMPOWERMENT 4 RISK MANAGEMENT 1 AMBITION, POLICY AND RULES LEADERSHIP, ACCOUNTABILITY AND ORGANISATION PLAN AND COMMIT 5 EMERGENCY PREPAREDNESS 10 AUDIT AND MATURITY PATH 9 LEARN AND
Securing safe, clean drinking water for all
Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
EuroCloud Star Audit. A strong partnership that provides you with a competitive advantage
EuroCloud Star Audit A strong partnership that provides you with a competitive advantage Strong and advantageous? 5 topics to consider 99% of all organisations are SME, with little internal Know- how.
SUPPLY CHAIN MANAGEMENT
Phone:Contact Us Email: [email protected] SUPPLY CHAIN MANAGEMENT Generate a group quote today or register now for the next public course date COURSE LENGTH: 1.0 DAYS Supply Chain Management requires
quality, health & safety and environment training and consulting
quality, health & safety and environment training and consulting QUALMS Group QHSE Training & Consulting is a leading business services provider of applied; Quality, Food Safety, Occupational Health &
Business Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
The BRC Food Standard today
The BRC Food Standard today In 1 year 1,600 auditors spend 33,000 days auditing 18,000 facilities in 115 countries, against 18 Food categories & 279 clauses. 160,000 non-conformities will be issued and
Sub-section Content. 1 Preliminaries - Post title: Head of Group Insurance - Reports to: Director of Risk - Location: xxx
Sub-section Content 1 Preliminaries - Post title: Head of Group Insurance - Reports to: irector of Risk - Location: xxx 2 Job Purpose - efine, propose and implement a global insurance purchasing strategy.
Leap Ahead Procurement Goes Social
Leap Ahead Procurement Goes Social In the past five years, social media has become an integral part of the lives of people everywhere. In response, companies have been embracing social media with equal
FOOD FRAUD Threats & Impacts
FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact
Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.
Asset management Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified. Data is about more than numbers. It tells
How to Make RAM Part of the Business Process
How to Make RAM Part of the Business Process 14th Transport Sector Coordinating Committee (TSCC) Meeting of the Central Asia Regional Economic Cooperation Program 27-30 April 2015 Ulaanbaatar, Mongolia
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Business Continuity Plan Toolkit
Business Continuity Plan Toolkit March 2015 1 Contents The Template instructions for use... 2 Introduction... 3 What is the purpose of this toolkit?... 3 Why do you need a Business Continuity Plan?...
CIPS Sustainable procurement review
CIPS Sustainable procurement review Chartered Institute of Purchasing & Supply September 2011 Contents Content What is sustainable procurement? Relevance and impact Links with other standards and models
SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY
Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association
How To Ensure That Sovini Is A Successful Business
Group Risk Management Policy Originator: Approval date: Policy and Strategy Team Sovini Board PCHA Board OVH Board/EMT 6 th December 2013 31 st October 2013 14 th October 2013 Review date: December 2014
Associate Director, Performance and Planning (8d)
Job title Accountable to Reports to Job summary Associate Director, Performance and Planning (8d) Director of Operations and Planning Director of Operations and Planning To implement a Trust-wide strategy
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise 4. Embedding
Science and Engineering Professional Framework
Contents: Introduction... 2 Who is the professional framework for?... 2 Using the science and engineering professional framework... 2 Summary of the Science and Engineering Professional Framework... 3
Monitoring & Testing
Rivo provides a total monitoring, analysis, testing and reporting solution. Monitor environmental and other enterprise risk and performance metrics such as air, water and land waste/emissions. Monitor
Risks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE
STAATSKOERANT, 19 DESEMBER 2014 No. 38357 3 BOARD NOTICE NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE LONG-TERM INSURANCE ACT, 1998 (ACT NO. 52
Managing Risk Control Environment and Responsibilities
Managing Risk Page 1 of 8 Contents Introduction...3 Risk...3 Risk management - using the framework...3 Source of risk...3 Likelihood and impact...3 Inherent risk...4 Risk-reducing measures...4 Effectiveness...5
Bedford Group of Drainage Boards
Bedford Group of Drainage Boards Risk Management Strategy Risk Management Policy January 2010 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise
LABORATORY OUTSOURCING
June 2009 LABORATORY OUTSOURCING Intertek s EVP of Analytical Services, Dr. Andrew Swift, discusses laboratory outsourcing and explains how dedicated analytical service providers are stepping up to support
BRISTOL CITY COUNCIL HUMAN RESOURCES COMMITTEE. Richard Billingham (Service Director: Human Resources)
AGENDA ITEM NO. 9 BRISTOL CITY COUNCIL HUMAN RESOURCES COMMITTEE 17 th December 2015 Report of: Title: Ward: Richard Billingham (Service Director: Human Resources) Performance Management N/A Officer Presenting
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
State Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
Guidance ETHICAL PROCUREMENT AND SUPPLY
ETHICAL PROCUREMENT AND SUPPLY Published by the British Institute of Facilities Management June 2015 Introduction The importance of ethical procurement and supply The majority of organisations use supply
Strategic Alliance. Business Continuity Policy
Version 1.1 April 2016 Contents Contents Version control Foreword Policy Scope Aim and objectives Methods and standards Responsibilities Governance Training and exercises Page i ii 1 2 2 2 Version 1.1
