Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP
|
|
- Carmella Lloyd
- 8 years ago
- Views:
Transcription
1 Vulnerability Assessments Background, Elliott, PAS 96 and TACCP
2
3 Elliott Review into the Integrity and Assurance of Food Supply Networks Final Report The British Standards Institute has worked with Defra and industry, to develop a Publicly Available Specification Defending Food and Drink (PAS 96)...elements such as the use of the threats analysis and critical control points, or TACCP approach, are relevant in the prevention of food crime. BSI and Defra should continue to focus on the TACCP approach, and to consider the overlap and avoid duplication between malicious contamination and food crime. This approach will provide the building blocks of any future standards that could be developed on preventing food crime.
4 Food Quality, Safety, Fraud and Defence Overlaps Food Fraud Deliberate Actions Food Quality Food Defence Food Safety Accidental Acts
5 Elliott s Eight Pillars 1. Consumers First 2. Zero Tolerance 3. Intelligence Gathering 4. Laboratory Services 5. Audit 6. Government Support 7. Leadership 8. Crisis Management
6 GUIDELINE 72 - APPLICATION ROUTE TACCP TEAM SELECTION DEFINING THE SCOPE OF THE STUDY / PROCESS FLOW REVIEW CURRENT TACCP MEASURES IN PLACE THREAT CHARACTERISATION Personnel Premises Process Services Logistics Cybercrime MITIGATION STRATEGY DEVELOPMENT HORIZON SCANNING IMPLIMENTATION RECORDING / DOCUMENTATION AUDIT / REVIEW
7 TACCP, or Threat Assessment and Critical Control Point, is a system that was developed in accordance with the PAS96:2010. Title for the revised PAS96:2014 is, Guide to protecting and defending food and drink from deliberate attack, Updated from PAS96:2010, Defending food and drink. Guidance for the deterrence, detection and defeat of ideologically motivated and other forms of malicious attack on food and drink and their supply arrangements
8 Seven Sources of Food Fraud UNAPPROVED ENHANCEMENTS Melamine added to enhance protein value Use of unauthorized additives (Sudan dyes in spices) COUNTERFEITING Copies of popular foods not produced with acceptable safety assurances. DILUTION Watered down products (Also, potentially using non-potable / unsafe water) Olive oil diluted with cheaper substitutes SUBSTITUTION Sunflower oil partially substituted with mineral oil Hydrolyzed leather protein in milk CONCEALMENT Poultry injected with hormones to conceal disease Harmful food colouring applied to fresh fruit to cover defects MISLABELLING Expiry of dates, provenance (unsafe origin) Toxic Japanese star anise labelled as Chinese star anise Mislabelled recycled cooking oil GREY MARKET PRODUCTION / THEFT / DIVERSION Sale of excess unreported product
9 BRC V7 New Clause A documented Vulnerability Assessment shall be carried out of all raw materials to assess the potential risk of adulteration or substitution. This shall take into account: Historical evidence of substitution or adulteration Economic factors Ease of access to raw materials through the supply chain Sophistication of routine testing to identify adulterants Nature of the raw material
10 BRC V7 Interpretation Guide A number risk assessment tools have been published including some specialist vulnerability assessment tools, for example CARVER+Shock and TACCP (Threat Assessment Critical Control Points), which may be used to achieve a structured approach to the assessment process.
11 BRC V7 Interpretation Guide A vulnerability assessment is a search for potential weaknesses in the supply chain in order to prevent food fraud i.e. to prevent the adulteration or substitution of raw materials before they arrive at the site. The aim of the assessment is not to assess the potential for fraud at the site, but to examine the supply chain for potential concerns or weaknesses to identify those raw materials which are of particular risk of adulteration or substitution, such that appropriate controls need to be put in place.
12 BRC V7 Interpretation Guide Typical information to incorporate into the assessment includes: Any emerging issues and information identified Historical evidence of substitution or adulteration of the ingredient Cost/value of material Availability - for example, a poor harvest may restrict availability and may increase the potential for adulteration Sophistication of routine testing to identify adulterants if testing within the supply chain is comprehensive and specifically focused on potential fraud issues, then the likelihood of adulteration is reduced. Country of origin Length and complexity of the supply chain The nature of raw material may change the potential for food fraud
13 BRC V7 Interpretation Guide Output from the vulnerability assessment Where raw materials are identified as being of particular risk then appropriate assurance controls need to be in place to ensure that only genuine materials are purchased. Depending on the perceived risk assurance controls may include: Certificates of analysis from raw material suppliers Raw material testing Supply chain audits Use of tamper evidence or seals on incoming raw materials Enhanced supplier approval checks Mass balance exercises at the raw material supplier Changes to the supply chain eg a change of supplier or a move to a shorter supply chain
14 CARVER + shock A method from the FDA that puts a scoring system on attributes of: Criticality - measure of public health and economic impacts of an attack Accessibility - ability to physically access and egress from target Recuperability - ability of system to recover from an attack Vulnerability - ease of accomplishing attack Effect - amount of direct loss from an attack as measured by loss of production Recognizability - ease of identifying target shock - the combined health, economic, and psychological impacts of an attack
15 Vulnerability Assessment Section 106 of the Food Safety Modernization Act (FSMA) requires the FDA, among other things, to conduct a Vulnerability Assessment (VA) of the food system A VA is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system
16 FSMA - What is a Vulnerability Assessment? In food safety there are "hazards" to accidental contamination In food defense there are "vulnerabilities" to intentional contamination. In calculating risk of intentional threat, the common measure of vulnerability is the likelihood that an attack succeeds, if it is attempted By conducting a vulnerability assessment of a food production facility or process, you can determine the most vulnerable points in the infrastructure and focus resources on the most susceptible points
17 TACCP & HACCP Differences and Integrating the Systems
18 A Quote.. There are known known's. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. Donald Rumsfeld, US Secretary of Defense - February 2002 It could be said that HACCP is perhaps a study of the known known's and the known unknowns. TACCP is an analysis of some known unknowns and unknown unknowns.
19 Key Differences The team may cover the need for slightly different or additional disciplines The Process Flow Diagram (PFD) will be written to capture the entire process, not just that which takes place at the manufacturer s site As a result of the requirements, the potential hazards may detail not only Chemical, Physical and Biological hazards, but also cover the elements of radiological hazards and of adulteration. Potential contaminants within the TACCP study may not be confined to those which are pertinent to the process involved (e.g. Metal swarf from stirrer blade) At times with TACCP, the specific hazard at each process step might not be listed. TACCP suggests implementing response levels of Normal, Heightened and Exceptional, in parallel with Prerequisite programmes and Critical Control Points.
20 Flow diagram - Meatball manufacture Store in Freezer Thaw Primal Intake of Beef Store in Chill Store in Freezer Thaw Primal Intake of Pork Store in Chill Intake of other ingredients Storage Weigh Primals Weigh Primals Mince through 5mm plate Mince through 5mm plate Weigh batch Quantity Minced Beef Weigh batch Quantity Minced Pork Blend minced Beef, minced Pork and other ingredients Weigh batch seasonings and other ingredients Store in Chill Discharge into tote bins Form meatballs on forming machine Place in containers / trays / packaging Chill or Freeze Load Vehicle Dispatch Central delivery Depot Deliver to meatball in sauce manufacturer
21 FSMA Vulnerability Assessment The key activity types identified in the most vulnerable production environments are: Coating / Mixing / Grinding / Rework Ingredient Staging / Prep/Addition Liquid Receiving / Loading Liquid Storage / Hold / Surge Tanks
22 Primal Intake of Beef Primal Intake of Pork Store in Freezer Store in Freezer Thaw Store in Chill Thaw Store in Chill Weigh Primals Weigh Primals Mince Through 5mm Plate Mince Through 5mm Plate Weigh Batch Quantity Minced Beef Weigh Batch Quantity Minced Pork Blend Minced UK Beef, Minced Pork / Ingredients Store in Chill Discharge Into Tote Bins Form Meatballs on Forming Machine Place in Containers / Trays / Packaging Chill or Freeze Load Vehicle Dispatch Central delivery Depot Deliver to Meatball in Sauce Manufacturer
23 TACCP Human Elements
24 The Centre for the Protection of National Infrastructure (CPNI's) Insider Data Collection Study indicated: Significantly more males engaged in insider activity (82%) than females (18%) The majority of insider acts were carried out by permanent staff (88%); only 7% of cases involved contractors and only 5% involved agency or temporary staff 60% of cases were individuals who had worked for their organisation for less than five years 49% of insider cases occurred within the years age category. Instances of insider cases increased with age until they peaked within this category and then decreased beyond 45 years of age
25 Human factors Human Factors Errors Skill based errors Mistakes Slips of action Lapses of memory Rule based mistakes Knowledge based mistakes Intended to set dial to 3 accidentally set to 6 Thought the setting should be 4 when in fact it should be 6 Used baking powder instead of baking soda Used a thermometer that wasn t calibrated Routine Knows to follow steps 1 to 10 in order but always performs steps 1-5, 7-10 then step 8 Violations Situational When under time or other constraints, the action not carried out as per the procedure Exceptional Disgruntled employee received a warning that day and chose to act in a way they shouldn t
26 Complacency, Incompetence, Criminality: 3 Business Threats
27 Subject Matter: Complacency Smug self satisfaction Incompetence Lacking the necessary skill Sudan dyes Melamine Criminality Tendency to illegal acts
28 Case study I: Sudan dyes (genotoxic carcinogens, prohibited for use in food) May 03 France reports Sudan dyes as an issue in Indian chilli products Jul 03 Pan-EU controls introduced Feb 04 FSA reminds UK industry of issue Jan Alerts issued in UK since 2003 Feb 05 Worcestershire sauce found with sudan (made with 2002 chilli) Mar products withdrawn from the UK market
29
30 Case Study II: Melamine 2005/6 Local reports of melamine as an in issue in Chinese milk Mar 07 First US pet deaths directly attributable to melamine Aug 07 >5300 products recalled Jun 08 Linkage between baby kidney damage and Sanlu milk in Gansu province Aug 08 Melamine found by Fonterra (NZ) Sep 08 Fonterra advise NZ government who advise the Chinese govt. Significance of problem recognised Dec 08 Estimated number of cases: >250,000 babies & infants
31 Points to consider Understand the historical perspective Inevitable lag time between commencement and detection Value of certification Adulteration often relates to value (money) determining product attributes Attribute quality is often measured to an indirect or subjective end-point (e.g. Colour) Fraud is becoming more sophisticated chemically identical substitutes (e.g. vanilla) Commodity items (e.g. olive oil / basmati rice / tomato paste)
32 How To Conduct a TACCP Study
33 APPLICATION ROUTE / LOGIC TABLE TEAM SELECTION DEFINING THE SCOPE OF THE STUDY / PROCESS FLOW REVIEW CURRENT TACCP MEASURES IN PLACE THREAT CHARACTERISATION Personnel Premises Process Services Logistics Cybercrime MITIGATION STRATEGY DEVELOPMENT HORIZON SCANNING IMPLIMENTATION RECORDING / DOCUMENTATION AUDIT / REVIEW
34 Threats categorised by likelihood / impact and plotted 5 4 EXCEPTIONAL Impact 3 HEIGHTENED 2 1 NORMAL Likelihood
35 DOC REF: TACCP1 DATE: XX/XX/XX EDITION: 1 VERSION: 1 TACCP ANALYSIS: FOOD SECURITY Product / Process: No. Process step description Step No. Threat description and job role involved Response: Normal Heightened Exceptional Preventative Actions / Control Measures Severity Likelihood Total 1 2 3
36 Thank you Lorraine Green Quality Management Systems Specialist Campden BRI Tel:
FOOD FRAUD Vulnerability & Impact
FOOD FRAUD Vulnerability & Impact THE INDUSTRY S RESPONSE Aldin Hilbrands, Royal Ahold Outline Food Fraud Types Drivers Impact Food Industry s Response Food Fraud in the Context of Food Safety Economically
More informationFOOD FRAUD Threats & Impacts
FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact
More informationFSSC 22000 ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member
FSSC 22000 ASIA Event 11 November 2015 Tokyo Petra Wissenburg Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member Introduction to GFSI Food Fraud Mitigation 2 Introduction
More informationRisk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.
Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.com Reduce likelihood of attack Protect brand/ reputations Reassure customers
More informationVulnerability Assessment. U.S. Food Defense Team
Vulnerability Assessment U.S. Food Defense Team Vulnerability A weakness in a processing, handling or storage facility or operation that would allow for intentional contamination of a food product Vulnerability
More informationUNDERSTANDING VULNERABILITY ASSESSMENT
UNDERSTANDING VULNERABILITY ASSESSMENT Liability The BRC publishes information and expresses opinions in good faith, but accepts no liability for any error or omission in any such information or opinion,
More informationHow To Prevent Food Fraud
THE LATEST FRAUD DETECTION AND PREVENTION MODELS AND TOOLS Carole Payne A growing problem but will angst turn to action? What information should U.S. regulators seek and from what sources to help predict
More informationFood Safety vs. Food Defense: Differences and Similarities
Food Safety vs. Food Defense: Differences and Similarities Protecting the Middle East Food Supply from Intentional Contamination MEPI January 29-31, 2008 Cairo, Egypt Dr. Carol Maczka, Ph.D. Assistant
More informationGLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES 2015. In partnership with
GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES 2015 In partnership with PROGRAMME OVERVIEW Food fraud is growing and poses an increasing
More informationFOOD SAFETY SYSTEM CERTIFICATION 22000 FSSC 22000
FOOD SAFETY SYSTEM CERTIFICATION 22000 FSSC 22000 Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs Features Foundation for Food
More informationCLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD
CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers
More informationThe BRC Food Standard today
The BRC Food Standard today In 1 year 1,600 auditors spend 33,000 days auditing 18,000 facilities in 115 countries, against 18 Food categories & 279 clauses. 160,000 non-conformities will be issued and
More informationFOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.
More informationFDA s Vulnerability Assessment Software tool
FDA s Vulnerability Assessment Software tool Quick Instruction Guide The FDA s Vulnerability Assessment Software tool uses the CARVER + Shock methodology. The software tool is a user-friendly, interactive
More informationFood Safety and Quality Management System
Introduction The company has planned, established, documented and implemented a food safety and quality management system for the site, which is maintained in order to continually improve its effectiveness
More informationBRC Food Safety and Quality Management System. New Issue 7
New Issue 7 This is an ideal package for Food Manufacturers looking to meet BRC Global Standard for Food Safety (Issue 7 2015) for Food Safety Quality Management Systems. Our BRC Food Safety Quality Management
More informationVulnerability Assessments of Food Systems
Vulnerability Assessments of Food Systems Final Summary Report June 2009 February 2012 Table of Contents I. Executive Summary... 1 II. Background... 2 III. Method Overview... 6 IV. Assessment Results...
More informationCARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.
More informationCARVER+Shock Vulnerability Assessment Tool
Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure
More informationUNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 5420.4, Revision 3 9/15/06 HOMELAND SECURITY THREAT CONDITION RESPONSE - EMERGENCY PROCEDURES FOR
More informationDealing with risk. Why is risk management important?
Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe
More informationCONCEPTS OF FOOD SAFETY QUALITY MANAGEMENT SYSTEMS. Mrs. Malini Rajendran
CONCEPTS OF FOOD SAFETY AND QUALITY MANAGEMENT SYSTEMS Mrs. Malini Rajendran Brief background 1963 - The Codex Alimentarius Commission was created by FAO and WHO to develop food standards, guidelines and
More informationContaminated Products Insurance Application Form
Contaminated Products Insurance Application Form APPLICANT S INFORMATION Name of Applicant Mailing address Contact Person Name: Email and Phone number: Website address Years in operation Business Description:
More informationManagement of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer
Management of the Supply Chain: Excipients & APIs Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer 1.8 Quality Manual/Quality Policy Pfizer has integrated much of the supply chain Quality elements
More informationClick here to order the IFSQN FSSC 22000 Certification Package Now
This comprehensive Food Safety Management System Certification package contains all the tools you will need to achieve FSSC 22000 Certification. This workbook is provided to assist in the implementation
More informationLeila Kakko Tampere University of Applied science TRADITIONAL FOOD IN COMBATING FOODBORNE PATHOGENS 2011
Leila Kakko Tampere University of Applied science TRADITIONAL FOOD IN COMBATING FOODBORNE PATHOGENS 2011 World Food Programme Food quality control is necessary to ensure that food aid supplies are safe,
More informationCONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS
CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS BRC, IFS & FSSC2200 CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS BRC, IFS & FSSC2200 Different standards of food safety throughout the years have evolved
More informationFSIS Security Guidelines for Food Processors
United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety
More informationGUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING
GUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING 2.Storage Facilities 2.1 Use of off site facilities - are they controlled 2.1.1 Where the manufacturer commissions the services of (or contracts to) off
More informationCoordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency
Coordination and air quality monitoring during emergencies Colin Powlesland Environment Agency Contents h Introduction h What do we want to achieve? h Implementation programme h Incident timeline h Proposed
More informationGeneric risk assessment form. This document forms part of Loughborough University s health and safety policy Version 3 February 2014
Generic risk assessment form Date: (1) Assessed by: (2) Checked / Validated* by: (3) Location: (4) Assessment ref no (5) Review date: (6) Task / premises: (7) Activity (8) Significant hazard (9) Who might
More informationCLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
More informationLevel 4 Award in HACCP Management for Food
Level 4 Award in HACCP Management for Food Manufacturing July 2009 This qualification has a Credit Value of 4 Ofqual Qualification Number 500/66523/3 40 Guided Learning Hours Description Hazard Analysis
More informationA Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products
A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the
More informationFOOD FOR THOUGHT Topical Insights from our Subject Matter Experts
FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts A PHASED APPROACH TO PROVIDE A COMPLETE AND COMPLIANT CHEMICAL HAZARD ANALYSIS OF YOUR INCOMING INGREDIENTS The NFL White Paper Series
More informationFOOD SAFETY MANAGEMENT SYSTEMS (FSMS): REQUIREMENTS FOR ANY ORGANISATION IN THE FOOD CHAIN (ISO 22000:2005)
FOOD SAFETY MANAGEMENT SYSTEMS (FSMS): REQUIREMENTS FOR ANY ORGANISATION IN THE FOOD CHAIN (ISO 22000:2005) Dr.R.MANAVALAN, M.Pharm., Ph.D. Professor and Research Director, Department of Pharmaceutics,
More informationSHOP SMART, STORE SAFE
SHOP SMART, STORE SAFE Introduction This lesson gives an older adult audience an opportunity to focus on making the most of their food budgets by sharing strategies for healthy shopping on a budget and
More informationBest Practices For Retailer Operations Producing Raw Ground Beef
Best Practices For Retailer Operations Producing Raw Ground Beef Developed By: Beef Industry Food Safety Council National Cattlemen s Beef Association Edited by: Kerri B. Harris International HACCP Alliance
More informationUNDERSTANDING THE FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION STANDARD
UNDERSTANDING THE FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION STANDARD A WHITE PAPER ON THE CHALLENGES, IMPACTS AND OPPORTUNITIES CONTAINED IN FSSC 22000 FEBRUARY 2010 AUTHORS Supreeya Sansawat Global
More informationBRC Food Safety Management System Implementation Workbook
We have written this workbook to assist in the implementation of your BRC food safety management system. The workbook is divided into 8 steps that are designed to assist you in implementing your food safety
More informationProduct Risk Management
Product Risk Management PRODUCT RISK MANAGEMENT PROTECTING CONSUMERS, PROTECTING REPUTATIONS When you re manufacturing food and beverages for consumers, product safety is the number one priority. Having
More informationThis quick guide provides a summary of food safety and labelling advice for small scale home producers of chutneys, pickles, flavoured oils and jams.
This quick guide provides a summary of food safety and labelling advice for small scale home producers of chutneys, pickles, flavoured oils and jams. General Food Safety Advice Registration Food business
More informationContents 1.0 FROM THE CHIEF EXECUTIVE 2.0 QUALITY COMMITMENT
Contents 1.0 FROM THE CHIEF EXECUTIVE 2.0 QUALITY COMMITMENT 3.0 QUALITY Principles 4.0 QUALITY STRUCTURE AND RESPONSIBILITIES 5.0 QUALITY SYSTEM ELEMENTS 5.1 Customer Satisfaction 5.2 Buildings, Facilities,
More informationSTANDARD OPERATING PROCEDURE S (SOP S) FOR HAZARDOUS ANALYSIS CRITICAL CONTROL POINT (HACCP) PLANS
STANDARD OPERATING PROCEDURE S (SOP S) FOR HAZARDOUS ANALYSIS CRITICAL CONTROL POINT (HACCP) PLANS RECEIVING: All food must be from approved sources. Foods must be wholesome and not adulterated. No home-prepared
More informationRisk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1
Risk Assessment for Medical Devices Linda Braddon, Ph.D. Bring your medical device to market faster 1 My Perspective Work with start up medical device companies Goal: Making great ideas into profitable
More informationBusiness Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
More informationDecree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products
Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Chapter 1 General Principle Article 1 In order to enhance inspection,
More informationSecurity Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
More informationGlobal Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationFood Defense Supplier Guidelines
Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments
More information1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY
BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationAn Introduction to. Business Continuity Planning
An Introduction to Business Continuity Planning Company Profile Practical Experience European Head Office Extensive Client Base Established 1998 Expert Consultants Global Network Why BCP? I am often asked
More informationWhat does it take to deliver the most technologically advanced Games ever?
What does it take to deliver the most technologically advanced Games ever? Enzo Sacco, Quang Tu October 20, 2015 Purpose of today s session To share our experiences and lessons learned in securing the
More informationBRC/IOP A new standard for the Food Packaging Sector Siobhan Walsh Bsc., Food Supply Chain Specialist, Team BDS
BRC/IOP A new standard for the Food Packaging Sector Siobhan Walsh Bsc., Food Supply Chain Specialist, Team BDS Siobhan Walsh has over 12 years experience implementing a range of systems and standards
More informationWalton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit
Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This
More informationIFS FOOD VERSION 5 IFS COMPENDIUM OF DOCTRINE
IFS FOOD VERSION 5 IFS COMPENDIUM OF DOCTRINE ENGLISH VERSION CORRESPONDING TO THE ENGLISH VERSION OF THE IFS FOOD VERSION 5 IFS, July 2008 Content I. DOCTRINE The Doctrine Concept...4 1) Doctrine - definition:...
More informationFood Safety Evaluation Checklist. Directions
Food Safety Checklist The following self-assessment can help you find food safety gaps in your operation. It can also help you put food safety systems, such as active managerial control, into place. This
More informationName of Business. Record 1- Approved Food Suppliers List
Record 1- Approved Food Suppliers List Supplier No. Details of Supplier (Name, address, contact details) Product Description Approved Supplier Date approved Corrective Action Reject suppliers that do not
More informationAnnex 9 Guide to good storage practices for pharmaceuticals 1
World Health Organization WHO Technical Report Series, No. 908, 2003 Annex 9 Guide to good storage practices for pharmaceuticals 1 1. Introduction 125 2. Glossary 126 3. Personnel 128 4. Premises and facilities
More informationHAZARD ANALYSIS CRITICAL CONTROL POINT PLAN SUMMARY SETHNESS PRODUCTS COMPANY LIQUID CARAMEL COLOR
HAZARD ANALYSIS CRITICAL CONTROL POINT PLAN SUMMARY SETHNESS PRODUCTS COMPANY LIQUID CARAMEL COLOR I. INTRODUCTION A. CARAMEL COLOR 1. Caramel Color (Caramel) is defined in Title 21 of the U.S. Code of
More informationFreedom of Information Request Reference No: I note you seek access to the following information:
Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly
More informationISO 22000 Food Safety Management System
This is an ideal package for Food Manufacturers looking to meet International Food Safety Standards. This system meets the requirements of International Standard ISO 22000:2005 for Food Safety Management
More informationFinal Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
More informationRisk Ranking and Risk Prioritization Tools
Risk Ranking and Risk Prioritization Tools Workshop on Produce Safety in Schools Sherri B. Dennis, Ph.D. FDA/CFSAN/OFDCER/RACT October 28, 2009 Managing Food Safety Risk We have a full table Trying to
More informationIncident Reporting Procedure
Number 1. Purpose This outlines the process for reporting and investigating incidents that occur in the West Coast District Health Board (WCDHB) Services with a view to preventing recurrence. 2. Application
More informationUnderstanding Root Cause Analysis
BRC Global Standards 6/1/2012 Contents 1. What is Root Cause Analysis?... 1 2. Where in the Standard is RCA Required?... 3 3. How to Complete Root Cause Analysis?... 3 4. Methods of Root Cause Analysis...
More informationPMO Inspection - HACCP Audit Comparison Table
Plant Listing Procedures PMO Inspection - HACCP Audit Comparison Table Inspection Based Milk May be done immediately. Frequency is a minimum of once every 2 years FDA Certified State Rating Officer (SRO)
More informationOil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services
Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current
More informationWORKERS' COMPENSATION SUBROGATION AND THIRD-PARTY CLAIMS
WORKERS' COMPENSATION SUBROGATION AND THIRD-PARTY CLAIMS I. INTRODUCTION BY RICHARD M. JUREWICZ, ESQUIRE GALFAND BERGER, LLP 1835 Market Street, Suite 2710 Philadelphia, PA 19103 1-800-222-8792 (ext. 829)
More informationRx-360 Supply Chain Security White Paper: Incident Management
Rx-360 Supply Chain Security White Paper: Incident Management 1 Contents Background... 3 Scope... 3 Definitions... 4 Introduction... 5 Discovery & Investigation... 5 Incident Management... 6 Lessons Learned...
More informationUS Food Safety Modernization Act:
US Food Safety Modernization Act: Overview and Impact for Importers and Exporters August 2012 This paper covers important updates related to the US Food Safety Modernization Act (FSMA) and recent changes
More informationUsing emerging technologies Getting the best results from paper based data capture
Using emerging technologies Getting the best results from paper based data capture Andy Tye 1 & Mike Smethurst 2 DRS Data Services Ltd. 3 Introduction: This paper reviews the tried and tested techniques
More informationFood Defense Self-Assessment Checklist for. Slaughter and Processing Plants
Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More informationPenetration Testing. I.T. Security Specialists. Penetration Testing 1
Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches
More informationSchool Science Lab Safety Guidelines
School Science Lab Safety Guidelines Occupational Safety & Health Bureau Montana Department of Labor & Industry Prepared for Montana Employers by the Occupational Safety & Health Bureau Department of Labor
More informationThreat Intelligence. Benefits for the enterprise
Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value
More informationRx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities
Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various
More informationTitle: Material Tracking in a Food Factory
Title: Material Tracking in a Food Factory Author: James T. Luxhoj, Ph.D. Department of Industrial Engineering Rutgers University P.O. Box 909 Piscataway, New Jersey 08855-0909 Warning: This document may
More informationquality, health & safety and environment training and consulting
quality, health & safety and environment training and consulting QUALMS Group QHSE Training & Consulting is a leading business services provider of applied; Quality, Food Safety, Occupational Health &
More informationManaging Food Incidents Incident Management in the Food Standards Agency. Colin Houston Head of Incidents Unit
EMERGENZE IN SICUREZZA ALIMENTARE: PROCEDURE E GESTIONE FOOD SAFETY EMERGENCY: PROCEDURES AND MANAGEMENT Cremona, 6-8 Giugno 2011 Managing Food Incidents Incident Management in the Food Standards Agency
More informationBRC/IoP Global Standard
BRC/IoP Global Standard Food Packaging and Other Packaging Materials A guide to the revisions contained in Issue 2 of the Standard The purpose of this guide is to help companies obtain a quick overview
More informationPHYSICAL SECURITY. A Primer and a Story of Why it s Necessary
PHYSICAL SECURITY A Primer and a Story of Why it s Necessary 1 What Is PhySec? Physical Security consists of physical, logical and design measures which protect people, physical property and other assets
More informationThe Recover Report. It s business. But it s personal.
The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research
More informationFrom Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel
FEDERAL INSTITUTE FOR RISK ASSESSMENT From Farm to Fork - How to Improve Surveillance of the Food Supply Chain Prof. Dr. Dr. Andreas Hensel What can we do in the face of terrorist threats to food? 1. Improve
More informationStrategic Planning Presentation Enterprise Ireland Finance 4 Growth seminar, Cork, 10 th March 2015
Strategic Planning Presentation Enterprise Ireland Finance 4 Growth seminar, Cork, 10 th March 2015 Company Overview HQ in Cork with distribution hubs in Dublin & UK. 3 Divisions Chemicals, Paint and Food
More informationPROMOTION // TECHNOLOGY. The Economics Of Cyber Security
PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the
More informationAn Introduction to Internal Audits
An BRC Global Standards. Trust in Quality Internal Audits (Section 3.4 excluding 3.4.4) An internal audit is any audit completed by or on behalf of the company, rather than conducted by a second or third
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationAlways Worry About Cyber Security. Always. Track 4 Session 8
Always Worry About Cyber Security. Always. Track 4 Session 8 Mark Stevens SVP, Global Services and Support Digital Guardian MStevens@DigitalGuardian.com 781-902-7818 www.digitalguardian.com 2 Abstract
More informationA GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
More informationQuality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle
Quality Risk Management 11 November 2011 Galway, Ireland Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle Overview Regulatory
More informationIndustryEdge for hotels and restaurants OUR KNOWLEDGE IS YOUR EDGE
IndustryEdge for hotels and restaurants OUR KNOWLEDGE IS YOUR EDGE OUR KNOWLEDGE IS YOUR EDGE IndustryEdge At Travelers, we recognise that no two industries are the same and that dealing with the complexities
More informationSecurity Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More informationPenetration Testing Services. Demonstrate Real-World Risk
Penetration Testing Services Demonstrate Real-World Risk Penetration Testing Services The best way to know how intruders will actually approach your network is to simulate a real-world attack under controlled
More informationResponse XL North America. XL Group Insurance. Product Recall
Response XL North America XL Group Insurance Product Recall 01 Introduction 02 Our network and approach 03 Our crisis and risk management consulting service 04 The Response XL service We understand that
More information