Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP

Size: px
Start display at page:

Download "Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP"

Transcription

1 Vulnerability Assessments Background, Elliott, PAS 96 and TACCP

2

3 Elliott Review into the Integrity and Assurance of Food Supply Networks Final Report The British Standards Institute has worked with Defra and industry, to develop a Publicly Available Specification Defending Food and Drink (PAS 96)...elements such as the use of the threats analysis and critical control points, or TACCP approach, are relevant in the prevention of food crime. BSI and Defra should continue to focus on the TACCP approach, and to consider the overlap and avoid duplication between malicious contamination and food crime. This approach will provide the building blocks of any future standards that could be developed on preventing food crime.

4 Food Quality, Safety, Fraud and Defence Overlaps Food Fraud Deliberate Actions Food Quality Food Defence Food Safety Accidental Acts

5 Elliott s Eight Pillars 1. Consumers First 2. Zero Tolerance 3. Intelligence Gathering 4. Laboratory Services 5. Audit 6. Government Support 7. Leadership 8. Crisis Management

6 GUIDELINE 72 - APPLICATION ROUTE TACCP TEAM SELECTION DEFINING THE SCOPE OF THE STUDY / PROCESS FLOW REVIEW CURRENT TACCP MEASURES IN PLACE THREAT CHARACTERISATION Personnel Premises Process Services Logistics Cybercrime MITIGATION STRATEGY DEVELOPMENT HORIZON SCANNING IMPLIMENTATION RECORDING / DOCUMENTATION AUDIT / REVIEW

7 TACCP, or Threat Assessment and Critical Control Point, is a system that was developed in accordance with the PAS96:2010. Title for the revised PAS96:2014 is, Guide to protecting and defending food and drink from deliberate attack, Updated from PAS96:2010, Defending food and drink. Guidance for the deterrence, detection and defeat of ideologically motivated and other forms of malicious attack on food and drink and their supply arrangements

8 Seven Sources of Food Fraud UNAPPROVED ENHANCEMENTS Melamine added to enhance protein value Use of unauthorized additives (Sudan dyes in spices) COUNTERFEITING Copies of popular foods not produced with acceptable safety assurances. DILUTION Watered down products (Also, potentially using non-potable / unsafe water) Olive oil diluted with cheaper substitutes SUBSTITUTION Sunflower oil partially substituted with mineral oil Hydrolyzed leather protein in milk CONCEALMENT Poultry injected with hormones to conceal disease Harmful food colouring applied to fresh fruit to cover defects MISLABELLING Expiry of dates, provenance (unsafe origin) Toxic Japanese star anise labelled as Chinese star anise Mislabelled recycled cooking oil GREY MARKET PRODUCTION / THEFT / DIVERSION Sale of excess unreported product

9 BRC V7 New Clause A documented Vulnerability Assessment shall be carried out of all raw materials to assess the potential risk of adulteration or substitution. This shall take into account: Historical evidence of substitution or adulteration Economic factors Ease of access to raw materials through the supply chain Sophistication of routine testing to identify adulterants Nature of the raw material

10 BRC V7 Interpretation Guide A number risk assessment tools have been published including some specialist vulnerability assessment tools, for example CARVER+Shock and TACCP (Threat Assessment Critical Control Points), which may be used to achieve a structured approach to the assessment process.

11 BRC V7 Interpretation Guide A vulnerability assessment is a search for potential weaknesses in the supply chain in order to prevent food fraud i.e. to prevent the adulteration or substitution of raw materials before they arrive at the site. The aim of the assessment is not to assess the potential for fraud at the site, but to examine the supply chain for potential concerns or weaknesses to identify those raw materials which are of particular risk of adulteration or substitution, such that appropriate controls need to be put in place.

12 BRC V7 Interpretation Guide Typical information to incorporate into the assessment includes: Any emerging issues and information identified Historical evidence of substitution or adulteration of the ingredient Cost/value of material Availability - for example, a poor harvest may restrict availability and may increase the potential for adulteration Sophistication of routine testing to identify adulterants if testing within the supply chain is comprehensive and specifically focused on potential fraud issues, then the likelihood of adulteration is reduced. Country of origin Length and complexity of the supply chain The nature of raw material may change the potential for food fraud

13 BRC V7 Interpretation Guide Output from the vulnerability assessment Where raw materials are identified as being of particular risk then appropriate assurance controls need to be in place to ensure that only genuine materials are purchased. Depending on the perceived risk assurance controls may include: Certificates of analysis from raw material suppliers Raw material testing Supply chain audits Use of tamper evidence or seals on incoming raw materials Enhanced supplier approval checks Mass balance exercises at the raw material supplier Changes to the supply chain eg a change of supplier or a move to a shorter supply chain

14 CARVER + shock A method from the FDA that puts a scoring system on attributes of: Criticality - measure of public health and economic impacts of an attack Accessibility - ability to physically access and egress from target Recuperability - ability of system to recover from an attack Vulnerability - ease of accomplishing attack Effect - amount of direct loss from an attack as measured by loss of production Recognizability - ease of identifying target shock - the combined health, economic, and psychological impacts of an attack

15 Vulnerability Assessment Section 106 of the Food Safety Modernization Act (FSMA) requires the FDA, among other things, to conduct a Vulnerability Assessment (VA) of the food system A VA is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system

16 FSMA - What is a Vulnerability Assessment? In food safety there are "hazards" to accidental contamination In food defense there are "vulnerabilities" to intentional contamination. In calculating risk of intentional threat, the common measure of vulnerability is the likelihood that an attack succeeds, if it is attempted By conducting a vulnerability assessment of a food production facility or process, you can determine the most vulnerable points in the infrastructure and focus resources on the most susceptible points

17 TACCP & HACCP Differences and Integrating the Systems

18 A Quote.. There are known known's. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. Donald Rumsfeld, US Secretary of Defense - February 2002 It could be said that HACCP is perhaps a study of the known known's and the known unknowns. TACCP is an analysis of some known unknowns and unknown unknowns.

19 Key Differences The team may cover the need for slightly different or additional disciplines The Process Flow Diagram (PFD) will be written to capture the entire process, not just that which takes place at the manufacturer s site As a result of the requirements, the potential hazards may detail not only Chemical, Physical and Biological hazards, but also cover the elements of radiological hazards and of adulteration. Potential contaminants within the TACCP study may not be confined to those which are pertinent to the process involved (e.g. Metal swarf from stirrer blade) At times with TACCP, the specific hazard at each process step might not be listed. TACCP suggests implementing response levels of Normal, Heightened and Exceptional, in parallel with Prerequisite programmes and Critical Control Points.

20 Flow diagram - Meatball manufacture Store in Freezer Thaw Primal Intake of Beef Store in Chill Store in Freezer Thaw Primal Intake of Pork Store in Chill Intake of other ingredients Storage Weigh Primals Weigh Primals Mince through 5mm plate Mince through 5mm plate Weigh batch Quantity Minced Beef Weigh batch Quantity Minced Pork Blend minced Beef, minced Pork and other ingredients Weigh batch seasonings and other ingredients Store in Chill Discharge into tote bins Form meatballs on forming machine Place in containers / trays / packaging Chill or Freeze Load Vehicle Dispatch Central delivery Depot Deliver to meatball in sauce manufacturer

21 FSMA Vulnerability Assessment The key activity types identified in the most vulnerable production environments are: Coating / Mixing / Grinding / Rework Ingredient Staging / Prep/Addition Liquid Receiving / Loading Liquid Storage / Hold / Surge Tanks

22 Primal Intake of Beef Primal Intake of Pork Store in Freezer Store in Freezer Thaw Store in Chill Thaw Store in Chill Weigh Primals Weigh Primals Mince Through 5mm Plate Mince Through 5mm Plate Weigh Batch Quantity Minced Beef Weigh Batch Quantity Minced Pork Blend Minced UK Beef, Minced Pork / Ingredients Store in Chill Discharge Into Tote Bins Form Meatballs on Forming Machine Place in Containers / Trays / Packaging Chill or Freeze Load Vehicle Dispatch Central delivery Depot Deliver to Meatball in Sauce Manufacturer

23 TACCP Human Elements

24 The Centre for the Protection of National Infrastructure (CPNI's) Insider Data Collection Study indicated: Significantly more males engaged in insider activity (82%) than females (18%) The majority of insider acts were carried out by permanent staff (88%); only 7% of cases involved contractors and only 5% involved agency or temporary staff 60% of cases were individuals who had worked for their organisation for less than five years 49% of insider cases occurred within the years age category. Instances of insider cases increased with age until they peaked within this category and then decreased beyond 45 years of age

25 Human factors Human Factors Errors Skill based errors Mistakes Slips of action Lapses of memory Rule based mistakes Knowledge based mistakes Intended to set dial to 3 accidentally set to 6 Thought the setting should be 4 when in fact it should be 6 Used baking powder instead of baking soda Used a thermometer that wasn t calibrated Routine Knows to follow steps 1 to 10 in order but always performs steps 1-5, 7-10 then step 8 Violations Situational When under time or other constraints, the action not carried out as per the procedure Exceptional Disgruntled employee received a warning that day and chose to act in a way they shouldn t

26 Complacency, Incompetence, Criminality: 3 Business Threats

27 Subject Matter: Complacency Smug self satisfaction Incompetence Lacking the necessary skill Sudan dyes Melamine Criminality Tendency to illegal acts

28 Case study I: Sudan dyes (genotoxic carcinogens, prohibited for use in food) May 03 France reports Sudan dyes as an issue in Indian chilli products Jul 03 Pan-EU controls introduced Feb 04 FSA reminds UK industry of issue Jan Alerts issued in UK since 2003 Feb 05 Worcestershire sauce found with sudan (made with 2002 chilli) Mar products withdrawn from the UK market

29

30 Case Study II: Melamine 2005/6 Local reports of melamine as an in issue in Chinese milk Mar 07 First US pet deaths directly attributable to melamine Aug 07 >5300 products recalled Jun 08 Linkage between baby kidney damage and Sanlu milk in Gansu province Aug 08 Melamine found by Fonterra (NZ) Sep 08 Fonterra advise NZ government who advise the Chinese govt. Significance of problem recognised Dec 08 Estimated number of cases: >250,000 babies & infants

31 Points to consider Understand the historical perspective Inevitable lag time between commencement and detection Value of certification Adulteration often relates to value (money) determining product attributes Attribute quality is often measured to an indirect or subjective end-point (e.g. Colour) Fraud is becoming more sophisticated chemically identical substitutes (e.g. vanilla) Commodity items (e.g. olive oil / basmati rice / tomato paste)

32 How To Conduct a TACCP Study

33 APPLICATION ROUTE / LOGIC TABLE TEAM SELECTION DEFINING THE SCOPE OF THE STUDY / PROCESS FLOW REVIEW CURRENT TACCP MEASURES IN PLACE THREAT CHARACTERISATION Personnel Premises Process Services Logistics Cybercrime MITIGATION STRATEGY DEVELOPMENT HORIZON SCANNING IMPLIMENTATION RECORDING / DOCUMENTATION AUDIT / REVIEW

34 Threats categorised by likelihood / impact and plotted 5 4 EXCEPTIONAL Impact 3 HEIGHTENED 2 1 NORMAL Likelihood

35 DOC REF: TACCP1 DATE: XX/XX/XX EDITION: 1 VERSION: 1 TACCP ANALYSIS: FOOD SECURITY Product / Process: No. Process step description Step No. Threat description and job role involved Response: Normal Heightened Exceptional Preventative Actions / Control Measures Severity Likelihood Total 1 2 3

36 Thank you Lorraine Green Quality Management Systems Specialist Campden BRI Tel:

FOOD FRAUD Vulnerability & Impact

FOOD FRAUD Vulnerability & Impact FOOD FRAUD Vulnerability & Impact THE INDUSTRY S RESPONSE Aldin Hilbrands, Royal Ahold Outline Food Fraud Types Drivers Impact Food Industry s Response Food Fraud in the Context of Food Safety Economically

More information

FOOD FRAUD Threats & Impacts

FOOD FRAUD Threats & Impacts FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact

More information

FSSC 22000 ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member

FSSC 22000 ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member FSSC 22000 ASIA Event 11 November 2015 Tokyo Petra Wissenburg Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member Introduction to GFSI Food Fraud Mitigation 2 Introduction

More information

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet. Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.com Reduce likelihood of attack Protect brand/ reputations Reassure customers

More information

Vulnerability Assessment. U.S. Food Defense Team

Vulnerability Assessment. U.S. Food Defense Team Vulnerability Assessment U.S. Food Defense Team Vulnerability A weakness in a processing, handling or storage facility or operation that would allow for intentional contamination of a food product Vulnerability

More information

UNDERSTANDING VULNERABILITY ASSESSMENT

UNDERSTANDING VULNERABILITY ASSESSMENT UNDERSTANDING VULNERABILITY ASSESSMENT Liability The BRC publishes information and expresses opinions in good faith, but accepts no liability for any error or omission in any such information or opinion,

More information

How To Prevent Food Fraud

How To Prevent Food Fraud THE LATEST FRAUD DETECTION AND PREVENTION MODELS AND TOOLS Carole Payne A growing problem but will angst turn to action? What information should U.S. regulators seek and from what sources to help predict

More information

Food Safety vs. Food Defense: Differences and Similarities

Food Safety vs. Food Defense: Differences and Similarities Food Safety vs. Food Defense: Differences and Similarities Protecting the Middle East Food Supply from Intentional Contamination MEPI January 29-31, 2008 Cairo, Egypt Dr. Carol Maczka, Ph.D. Assistant

More information

GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES 2015. In partnership with

GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES 2015. In partnership with GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES 2015 In partnership with PROGRAMME OVERVIEW Food fraud is growing and poses an increasing

More information

FOOD SAFETY SYSTEM CERTIFICATION 22000 FSSC 22000

FOOD SAFETY SYSTEM CERTIFICATION 22000 FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION 22000 FSSC 22000 Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs Features Foundation for Food

More information

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers

More information

The BRC Food Standard today

The BRC Food Standard today The BRC Food Standard today In 1 year 1,600 auditors spend 33,000 days auditing 18,000 facilities in 115 countries, against 18 Food categories & 279 clauses. 160,000 non-conformities will be issued and

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

FDA s Vulnerability Assessment Software tool

FDA s Vulnerability Assessment Software tool FDA s Vulnerability Assessment Software tool Quick Instruction Guide The FDA s Vulnerability Assessment Software tool uses the CARVER + Shock methodology. The software tool is a user-friendly, interactive

More information

Food Safety and Quality Management System

Food Safety and Quality Management System Introduction The company has planned, established, documented and implemented a food safety and quality management system for the site, which is maintained in order to continually improve its effectiveness

More information

BRC Food Safety and Quality Management System. New Issue 7

BRC Food Safety and Quality Management System. New Issue 7 New Issue 7 This is an ideal package for Food Manufacturers looking to meet BRC Global Standard for Food Safety (Issue 7 2015) for Food Safety Quality Management Systems. Our BRC Food Safety Quality Management

More information

Vulnerability Assessments of Food Systems

Vulnerability Assessments of Food Systems Vulnerability Assessments of Food Systems Final Summary Report June 2009 February 2012 Table of Contents I. Executive Summary... 1 II. Background... 2 III. Method Overview... 6 IV. Assessment Results...

More information

CARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM

CARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 5420.4, Revision 3 9/15/06 HOMELAND SECURITY THREAT CONDITION RESPONSE - EMERGENCY PROCEDURES FOR

More information

Dealing with risk. Why is risk management important?

Dealing with risk. Why is risk management important? Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe

More information

CONCEPTS OF FOOD SAFETY QUALITY MANAGEMENT SYSTEMS. Mrs. Malini Rajendran

CONCEPTS OF FOOD SAFETY QUALITY MANAGEMENT SYSTEMS. Mrs. Malini Rajendran CONCEPTS OF FOOD SAFETY AND QUALITY MANAGEMENT SYSTEMS Mrs. Malini Rajendran Brief background 1963 - The Codex Alimentarius Commission was created by FAO and WHO to develop food standards, guidelines and

More information

Contaminated Products Insurance Application Form

Contaminated Products Insurance Application Form Contaminated Products Insurance Application Form APPLICANT S INFORMATION Name of Applicant Mailing address Contact Person Name: Email and Phone number: Website address Years in operation Business Description:

More information

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer Management of the Supply Chain: Excipients & APIs Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer 1.8 Quality Manual/Quality Policy Pfizer has integrated much of the supply chain Quality elements

More information

Click here to order the IFSQN FSSC 22000 Certification Package Now

Click here to order the IFSQN FSSC 22000 Certification Package Now This comprehensive Food Safety Management System Certification package contains all the tools you will need to achieve FSSC 22000 Certification. This workbook is provided to assist in the implementation

More information

Leila Kakko Tampere University of Applied science TRADITIONAL FOOD IN COMBATING FOODBORNE PATHOGENS 2011

Leila Kakko Tampere University of Applied science TRADITIONAL FOOD IN COMBATING FOODBORNE PATHOGENS 2011 Leila Kakko Tampere University of Applied science TRADITIONAL FOOD IN COMBATING FOODBORNE PATHOGENS 2011 World Food Programme Food quality control is necessary to ensure that food aid supplies are safe,

More information

CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS

CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS BRC, IFS & FSSC2200 CONTROL PLANS IN FOOD SAFETY MANAGEMENT SYSTEMS BRC, IFS & FSSC2200 Different standards of food safety throughout the years have evolved

More information

FSIS Security Guidelines for Food Processors

FSIS Security Guidelines for Food Processors United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety

More information

GUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING

GUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING GUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING 2.Storage Facilities 2.1 Use of off site facilities - are they controlled 2.1.1 Where the manufacturer commissions the services of (or contracts to) off

More information

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency Coordination and air quality monitoring during emergencies Colin Powlesland Environment Agency Contents h Introduction h What do we want to achieve? h Implementation programme h Incident timeline h Proposed

More information

Generic risk assessment form. This document forms part of Loughborough University s health and safety policy Version 3 February 2014

Generic risk assessment form. This document forms part of Loughborough University s health and safety policy Version 3 February 2014 Generic risk assessment form Date: (1) Assessed by: (2) Checked / Validated* by: (3) Location: (4) Assessment ref no (5) Review date: (6) Task / premises: (7) Activity (8) Significant hazard (9) Who might

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Level 4 Award in HACCP Management for Food

Level 4 Award in HACCP Management for Food Level 4 Award in HACCP Management for Food Manufacturing July 2009 This qualification has a Credit Value of 4 Ofqual Qualification Number 500/66523/3 40 Guided Learning Hours Description Hazard Analysis

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts A PHASED APPROACH TO PROVIDE A COMPLETE AND COMPLIANT CHEMICAL HAZARD ANALYSIS OF YOUR INCOMING INGREDIENTS The NFL White Paper Series

More information

FOOD SAFETY MANAGEMENT SYSTEMS (FSMS): REQUIREMENTS FOR ANY ORGANISATION IN THE FOOD CHAIN (ISO 22000:2005)

FOOD SAFETY MANAGEMENT SYSTEMS (FSMS): REQUIREMENTS FOR ANY ORGANISATION IN THE FOOD CHAIN (ISO 22000:2005) FOOD SAFETY MANAGEMENT SYSTEMS (FSMS): REQUIREMENTS FOR ANY ORGANISATION IN THE FOOD CHAIN (ISO 22000:2005) Dr.R.MANAVALAN, M.Pharm., Ph.D. Professor and Research Director, Department of Pharmaceutics,

More information

SHOP SMART, STORE SAFE

SHOP SMART, STORE SAFE SHOP SMART, STORE SAFE Introduction This lesson gives an older adult audience an opportunity to focus on making the most of their food budgets by sharing strategies for healthy shopping on a budget and

More information

Best Practices For Retailer Operations Producing Raw Ground Beef

Best Practices For Retailer Operations Producing Raw Ground Beef Best Practices For Retailer Operations Producing Raw Ground Beef Developed By: Beef Industry Food Safety Council National Cattlemen s Beef Association Edited by: Kerri B. Harris International HACCP Alliance

More information

UNDERSTANDING THE FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION STANDARD

UNDERSTANDING THE FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION STANDARD UNDERSTANDING THE FSSC 22000 FOOD SAFETY SYSTEM CERTIFICATION STANDARD A WHITE PAPER ON THE CHALLENGES, IMPACTS AND OPPORTUNITIES CONTAINED IN FSSC 22000 FEBRUARY 2010 AUTHORS Supreeya Sansawat Global

More information

BRC Food Safety Management System Implementation Workbook

BRC Food Safety Management System Implementation Workbook We have written this workbook to assist in the implementation of your BRC food safety management system. The workbook is divided into 8 steps that are designed to assist you in implementing your food safety

More information

Product Risk Management

Product Risk Management Product Risk Management PRODUCT RISK MANAGEMENT PROTECTING CONSUMERS, PROTECTING REPUTATIONS When you re manufacturing food and beverages for consumers, product safety is the number one priority. Having

More information

This quick guide provides a summary of food safety and labelling advice for small scale home producers of chutneys, pickles, flavoured oils and jams.

This quick guide provides a summary of food safety and labelling advice for small scale home producers of chutneys, pickles, flavoured oils and jams. This quick guide provides a summary of food safety and labelling advice for small scale home producers of chutneys, pickles, flavoured oils and jams. General Food Safety Advice Registration Food business

More information

Contents 1.0 FROM THE CHIEF EXECUTIVE 2.0 QUALITY COMMITMENT

Contents 1.0 FROM THE CHIEF EXECUTIVE 2.0 QUALITY COMMITMENT Contents 1.0 FROM THE CHIEF EXECUTIVE 2.0 QUALITY COMMITMENT 3.0 QUALITY Principles 4.0 QUALITY STRUCTURE AND RESPONSIBILITIES 5.0 QUALITY SYSTEM ELEMENTS 5.1 Customer Satisfaction 5.2 Buildings, Facilities,

More information

STANDARD OPERATING PROCEDURE S (SOP S) FOR HAZARDOUS ANALYSIS CRITICAL CONTROL POINT (HACCP) PLANS

STANDARD OPERATING PROCEDURE S (SOP S) FOR HAZARDOUS ANALYSIS CRITICAL CONTROL POINT (HACCP) PLANS STANDARD OPERATING PROCEDURE S (SOP S) FOR HAZARDOUS ANALYSIS CRITICAL CONTROL POINT (HACCP) PLANS RECEIVING: All food must be from approved sources. Foods must be wholesome and not adulterated. No home-prepared

More information

Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1

Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1 Risk Assessment for Medical Devices Linda Braddon, Ph.D. Bring your medical device to market faster 1 My Perspective Work with start up medical device companies Goal: Making great ideas into profitable

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products

Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Chapter 1 General Principle Article 1 In order to enhance inspection,

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments

More information

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

An Introduction to. Business Continuity Planning

An Introduction to. Business Continuity Planning An Introduction to Business Continuity Planning Company Profile Practical Experience European Head Office Extensive Client Base Established 1998 Expert Consultants Global Network Why BCP? I am often asked

More information

What does it take to deliver the most technologically advanced Games ever?

What does it take to deliver the most technologically advanced Games ever? What does it take to deliver the most technologically advanced Games ever? Enzo Sacco, Quang Tu October 20, 2015 Purpose of today s session To share our experiences and lessons learned in securing the

More information

BRC/IOP A new standard for the Food Packaging Sector Siobhan Walsh Bsc., Food Supply Chain Specialist, Team BDS

BRC/IOP A new standard for the Food Packaging Sector Siobhan Walsh Bsc., Food Supply Chain Specialist, Team BDS BRC/IOP A new standard for the Food Packaging Sector Siobhan Walsh Bsc., Food Supply Chain Specialist, Team BDS Siobhan Walsh has over 12 years experience implementing a range of systems and standards

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This

More information

IFS FOOD VERSION 5 IFS COMPENDIUM OF DOCTRINE

IFS FOOD VERSION 5 IFS COMPENDIUM OF DOCTRINE IFS FOOD VERSION 5 IFS COMPENDIUM OF DOCTRINE ENGLISH VERSION CORRESPONDING TO THE ENGLISH VERSION OF THE IFS FOOD VERSION 5 IFS, July 2008 Content I. DOCTRINE The Doctrine Concept...4 1) Doctrine - definition:...

More information

Food Safety Evaluation Checklist. Directions

Food Safety Evaluation Checklist. Directions Food Safety Checklist The following self-assessment can help you find food safety gaps in your operation. It can also help you put food safety systems, such as active managerial control, into place. This

More information

Name of Business. Record 1- Approved Food Suppliers List

Name of Business. Record 1- Approved Food Suppliers List Record 1- Approved Food Suppliers List Supplier No. Details of Supplier (Name, address, contact details) Product Description Approved Supplier Date approved Corrective Action Reject suppliers that do not

More information

Annex 9 Guide to good storage practices for pharmaceuticals 1

Annex 9 Guide to good storage practices for pharmaceuticals 1 World Health Organization WHO Technical Report Series, No. 908, 2003 Annex 9 Guide to good storage practices for pharmaceuticals 1 1. Introduction 125 2. Glossary 126 3. Personnel 128 4. Premises and facilities

More information

HAZARD ANALYSIS CRITICAL CONTROL POINT PLAN SUMMARY SETHNESS PRODUCTS COMPANY LIQUID CARAMEL COLOR

HAZARD ANALYSIS CRITICAL CONTROL POINT PLAN SUMMARY SETHNESS PRODUCTS COMPANY LIQUID CARAMEL COLOR HAZARD ANALYSIS CRITICAL CONTROL POINT PLAN SUMMARY SETHNESS PRODUCTS COMPANY LIQUID CARAMEL COLOR I. INTRODUCTION A. CARAMEL COLOR 1. Caramel Color (Caramel) is defined in Title 21 of the U.S. Code of

More information

Freedom of Information Request Reference No: I note you seek access to the following information:

Freedom of Information Request Reference No: I note you seek access to the following information: Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly

More information

ISO 22000 Food Safety Management System

ISO 22000 Food Safety Management System This is an ideal package for Food Manufacturers looking to meet International Food Safety Standards. This system meets the requirements of International Standard ISO 22000:2005 for Food Safety Management

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

Risk Ranking and Risk Prioritization Tools

Risk Ranking and Risk Prioritization Tools Risk Ranking and Risk Prioritization Tools Workshop on Produce Safety in Schools Sherri B. Dennis, Ph.D. FDA/CFSAN/OFDCER/RACT October 28, 2009 Managing Food Safety Risk We have a full table Trying to

More information

Incident Reporting Procedure

Incident Reporting Procedure Number 1. Purpose This outlines the process for reporting and investigating incidents that occur in the West Coast District Health Board (WCDHB) Services with a view to preventing recurrence. 2. Application

More information

Understanding Root Cause Analysis

Understanding Root Cause Analysis BRC Global Standards 6/1/2012 Contents 1. What is Root Cause Analysis?... 1 2. Where in the Standard is RCA Required?... 3 3. How to Complete Root Cause Analysis?... 3 4. Methods of Root Cause Analysis...

More information

PMO Inspection - HACCP Audit Comparison Table

PMO Inspection - HACCP Audit Comparison Table Plant Listing Procedures PMO Inspection - HACCP Audit Comparison Table Inspection Based Milk May be done immediately. Frequency is a minimum of once every 2 years FDA Certified State Rating Officer (SRO)

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

WORKERS' COMPENSATION SUBROGATION AND THIRD-PARTY CLAIMS

WORKERS' COMPENSATION SUBROGATION AND THIRD-PARTY CLAIMS WORKERS' COMPENSATION SUBROGATION AND THIRD-PARTY CLAIMS I. INTRODUCTION BY RICHARD M. JUREWICZ, ESQUIRE GALFAND BERGER, LLP 1835 Market Street, Suite 2710 Philadelphia, PA 19103 1-800-222-8792 (ext. 829)

More information

Rx-360 Supply Chain Security White Paper: Incident Management

Rx-360 Supply Chain Security White Paper: Incident Management Rx-360 Supply Chain Security White Paper: Incident Management 1 Contents Background... 3 Scope... 3 Definitions... 4 Introduction... 5 Discovery & Investigation... 5 Incident Management... 6 Lessons Learned...

More information

US Food Safety Modernization Act:

US Food Safety Modernization Act: US Food Safety Modernization Act: Overview and Impact for Importers and Exporters August 2012 This paper covers important updates related to the US Food Safety Modernization Act (FSMA) and recent changes

More information

Using emerging technologies Getting the best results from paper based data capture

Using emerging technologies Getting the best results from paper based data capture Using emerging technologies Getting the best results from paper based data capture Andy Tye 1 & Mike Smethurst 2 DRS Data Services Ltd. 3 Introduction: This paper reviews the tried and tested techniques

More information

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Penetration Testing. I.T. Security Specialists. Penetration Testing 1 Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches

More information

School Science Lab Safety Guidelines

School Science Lab Safety Guidelines School Science Lab Safety Guidelines Occupational Safety & Health Bureau Montana Department of Labor & Industry Prepared for Montana Employers by the Occupational Safety & Health Bureau Department of Labor

More information

Threat Intelligence. Benefits for the enterprise

Threat Intelligence. Benefits for the enterprise Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value

More information

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various

More information

Title: Material Tracking in a Food Factory

Title: Material Tracking in a Food Factory Title: Material Tracking in a Food Factory Author: James T. Luxhoj, Ph.D. Department of Industrial Engineering Rutgers University P.O. Box 909 Piscataway, New Jersey 08855-0909 Warning: This document may

More information

quality, health & safety and environment training and consulting

quality, health & safety and environment training and consulting quality, health & safety and environment training and consulting QUALMS Group QHSE Training & Consulting is a leading business services provider of applied; Quality, Food Safety, Occupational Health &

More information

Managing Food Incidents Incident Management in the Food Standards Agency. Colin Houston Head of Incidents Unit

Managing Food Incidents Incident Management in the Food Standards Agency. Colin Houston Head of Incidents Unit EMERGENZE IN SICUREZZA ALIMENTARE: PROCEDURE E GESTIONE FOOD SAFETY EMERGENCY: PROCEDURES AND MANAGEMENT Cremona, 6-8 Giugno 2011 Managing Food Incidents Incident Management in the Food Standards Agency

More information

BRC/IoP Global Standard

BRC/IoP Global Standard BRC/IoP Global Standard Food Packaging and Other Packaging Materials A guide to the revisions contained in Issue 2 of the Standard The purpose of this guide is to help companies obtain a quick overview

More information

PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary

PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary PHYSICAL SECURITY A Primer and a Story of Why it s Necessary 1 What Is PhySec? Physical Security consists of physical, logical and design measures which protect people, physical property and other assets

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information

From Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel

From Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel FEDERAL INSTITUTE FOR RISK ASSESSMENT From Farm to Fork - How to Improve Surveillance of the Food Supply Chain Prof. Dr. Dr. Andreas Hensel What can we do in the face of terrorist threats to food? 1. Improve

More information

Strategic Planning Presentation Enterprise Ireland Finance 4 Growth seminar, Cork, 10 th March 2015

Strategic Planning Presentation Enterprise Ireland Finance 4 Growth seminar, Cork, 10 th March 2015 Strategic Planning Presentation Enterprise Ireland Finance 4 Growth seminar, Cork, 10 th March 2015 Company Overview HQ in Cork with distribution hubs in Dublin & UK. 3 Divisions Chemicals, Paint and Food

More information

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the

More information

An Introduction to Internal Audits

An Introduction to Internal Audits An BRC Global Standards. Trust in Quality Internal Audits (Section 3.4 excluding 3.4.4) An internal audit is any audit completed by or on behalf of the company, rather than conducted by a second or third

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Always Worry About Cyber Security. Always. Track 4 Session 8

Always Worry About Cyber Security. Always. Track 4 Session 8 Always Worry About Cyber Security. Always. Track 4 Session 8 Mark Stevens SVP, Global Services and Support Digital Guardian MStevens@DigitalGuardian.com 781-902-7818 www.digitalguardian.com 2 Abstract

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle

Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle Quality Risk Management 11 November 2011 Galway, Ireland Quality Risk Management The Pharmaceutical Experience Ann O Mahony Quality Assurance Specialist Pfizer Biotech Grange Castle Overview Regulatory

More information

IndustryEdge for hotels and restaurants OUR KNOWLEDGE IS YOUR EDGE

IndustryEdge for hotels and restaurants OUR KNOWLEDGE IS YOUR EDGE IndustryEdge for hotels and restaurants OUR KNOWLEDGE IS YOUR EDGE OUR KNOWLEDGE IS YOUR EDGE IndustryEdge At Travelers, we recognise that no two industries are the same and that dealing with the complexities

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Penetration Testing Services. Demonstrate Real-World Risk

Penetration Testing Services. Demonstrate Real-World Risk Penetration Testing Services Demonstrate Real-World Risk Penetration Testing Services The best way to know how intruders will actually approach your network is to simulate a real-world attack under controlled

More information

Response XL North America. XL Group Insurance. Product Recall

Response XL North America. XL Group Insurance. Product Recall Response XL North America XL Group Insurance Product Recall 01 Introduction 02 Our network and approach 03 Our crisis and risk management consulting service 04 The Response XL service We understand that

More information