FOOD FRAUD Threats & Impacts



Similar documents
FOOD FRAUD Vulnerability & Impact

FSSC ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member

Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP

Foreword Introduction - The Global Food Safety Initiative (GFSI) Scope Section Overview Normative References...

Overview of GFSI and Accredited Certification

GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES In partnership with

The BRC Food Standard today

How To Prevent Food Fraud

Private Certification to Inform Regulatory Risk-Based Oversight: Discussion Document

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD

National Cyber Security Policy -2013

quality, health & safety and environment training and consulting

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd

Building Global Trust - How effective is your supply chain management programme? Cor Groenveld LRQA Global Product Manager Food Services

UNDERSTANDING VULNERABILITY ASSESSMENT

The Sustainable Soy Sourcing Guidelines Second Edition

Safer food supply chains why assessments are great news for your business

Global Food Safety Systems Food-Borne Pathogen Control

Risk Management Policy

FSSC Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART I

Enhancing Food Safety Through Third Party Certification

Contact address: Global Food Safety Initiative Foundation c/o The Consumer Goods Forum 22/24 rue du Gouverneur Général Eboué Issy-les-Moulineaux

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

United Nations Guidelines for. Consumer Protection

FOOD SAFETY SYSTEM CERTIFICATION FSSC 22000

Industry Perspective on Managing Risks in a Global Market

REPORT. Next steps in cyber security

FSSC Food Safety System Certification Scheme - ISO and PAS 220. CIES Food Safety Conference Barcelona, February 2009

EXECUTIVE SAFETY LEADERSHIP

A Guide to the Cyber Essentials Scheme

FOOD SAFETY SYSTEM CERTIFICATION FSSC 22000

DEFENDING YOUR SUPPLY CHAIN: FOOD AUTHENTICIT Y AND INSURANCE

Rx-360 Supply Chain Security White Paper: Incident Management

An Introduction to ISO 22000: Food Safety Management Systems

AGRICULTURE, FOOD AND LIFE SCIENCES SGS OLIVIER COPPEY EXECUTIVE VICE PRESIDENT INVESTORS DAYS, OCTOBER 2015

REGULATIONS ON OPERATIONAL RISK MANAGEMENT OF THE BUDAPEST STOCK EXCHANGE LTD.

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer

The UK cyber security strategy: Landscape review. Cross-government

IAF Mandatory Document. Witnessing Activities for the Accreditation of Management Systems Certification Bodies. Issue 1, Version 2 (IAF MD 17:2015)

Technology and Cyber Resilience Benchmarking Report December 2013

Anti-Fraud Management Example In Accounts Payable. Michael Heckner October 12, 2012

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

UNDERSTANDING THE FSSC FOOD SAFETY SYSTEM CERTIFICATION STANDARD

Procedure for EFISC, operators and CB s

WEEK 10: CASE STUDY. MIS 3537: Internet and Supply Chains

Food Standards Agency in Scotland

Committees Date: Subject: Public Report of: For Information Summary

EXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium

Forest Management and Chain of Custody Certification November 18, 2014 WPAC 2014 AGM Fibre Supply Chain Certification 101

FAMI-QS Certification Rules for Operators. Rules for Operators

Introduction to Social Compliance & Its Business Benefits

Who s next after TalkTalk?

FOR FOOD SAFETY AND APPLIED NUTRITION AND UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE

Internal Audit Hearing Sheet

THE US FOREIGN CORRUPT PRACTICES ACT ( FCPA ) COMPLIANCE POLICY AND GUIDELINES

Vulnerability Assessment and Approaches to Food Fraud Prevention

Safe%Feed/Safe%Food% Overview of Certification Programs: Why Should a Feed Mill Get Certified?

Ecoetiquetado de pescado y de productos del mar. Dr. Audun Lem Senior Fishery Industry Officer FAO

ENTERPRISE RISK MANAGEMENT FRAMEWORK

McAfee Security Architectures for the Public Sector

FAO/WHO Regional Conference on Food Safety for the Americas and the Caribbean San José, Costa Rica, 6-9 December 2005

Cyber security Building confidence in your digital future

Effective Supply Chain Management

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Safe Quality Food Food Safety Certification

CGI Cyber Risk Advisory and Management Services for Insurers

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

ITU Global Cybersecurity Agenda (GCA)

Chain of Custody Standard

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

INFORMATION ON CHANGES IN CPCC AF, CB, F&V, FO, PPM, TE, AB, LB, PY and CROPS RULES IN IFA VERSION Publication 1 st July 2016

SUPPLY CHAIN INTEGRITY AND SECURITY

Information Security Management Systems

ISO Energy Management System

Third Party Audits and Certifications

NimkarTek Technical Services Pvt Ltd

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

ISRS. For the health of your business SAFER, SMARTER, GREENER

The new phenomenon of criminal fraud in the food supply chain. The rapid rise of food fraud and the collective responses to the global threat

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Canada s Organic Market National Highlights, 2013

Procuring Penetration Testing Services

Guidance ETHICAL PROCUREMENT AND SUPPLY

Mobile banking and payments supporting an innovative and secure market

ISO/IEC Part 1 the next edition

Peter Cook University of Western Australia Chairman: ASC Technical Advisory Group

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Global Security Program Overview

Application Guidance CCP Penetration Tester Role, Practitioner Level

BT Quick Starts for Retail Banking Customers

A Framework for Managing Crime and Fraud

Selection and use of the ISO 9000 family of standards

Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012

OUR CUSTOMERS. Exciting, beautifully designed, excellent quality clothing and homeware that reflects the aspirations and means of our customers

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort

Environmental footprinting of products The policy outlook

Competency Unit: Exemplar Global SCY Security Management Systems Auditing

Il nuovo standard ISO sulla Business Continuity Scenari ed opportunità

Cloud security architecture

Transcription:

FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact Food Industry s Response Analytical Testing Strategy 1

GFSI: Global Food Safety Initiative Launched in 2000 GFSI is an industry-driven initiative gathering world s leading food safety experts GFSI provides leadership & guidance on food safety management systems GFSI is managed by the CGF CGF is a global parity-based industry network which brings together CEOs from 400 companies across 70 countries CGF member companies have combined sales of 2.5 Tr. CGF is governed by a Board of Directors including 50 manufacturers and retailers GFSI Mission The mission Provide continuous improvement in food safety management systems to ensure confidence in the delivery of safe food to consumers worldwide. 2

GFSI Objectives GFSI Objectives: Reduce food safety risks Manage cost in the supply chain Develop competencies and capacity building Facilitate knowledge exchange and networking Key Activities: Specifying in its guidance document, the requirements for food safety schemes and how these requirements should be implemented controlled and monitored Driving global change through multi-stakeholder projects on strategic food safety issues A Global Multi-Stakeholder Platform Government Retailers Certification Bodies Scheme Owners Suppliers International organizations Accreditation Bodies Academia Service Providers Food Service 3

Platform for Collaboration Building Confidence in Certification Benchmarking & recognition of food safety management schemes against the GFSI Guidance Document Sets the requirements for food safety management schemes and key elements for the production of food and feed Defines the requirements for the effective management and control of conforming schemes Puts in place transparent procedures for the GFSI benchmarking process 4

Once Certified, Accepted Everywhere These are the recognized schemes: Other Activities within GFSI Global Markets Programmes Tool for development of supplier food safety management systems toward certification Targets less developed companies in primary production and manufacturing Facilitating their market access Auditor Competence Consensus on the skills, knowledge and attributes that a competent food safety auditor should possess 5

Benefits of the GFSI Approach Supply chain Improved product integrity Better access to market Reduces duplication Public Health Improved public health Complement legislation Reduced foodborne diseases Country reputation & local economy Food Fraud in the Context of Food Safety Economically driven Motivation is GAIN Intentional adulteration Food Fraud Food Quality Food Defence Ideologically driven Motivation is HARM Unintentional / accidental adulteration Food Safety Science based Food borne illness 6

Terminology Sunflower oil partially substituted with mineral oil Hydrolyzed leather protein in milk Watered down products using non-potable / unsafe water Olive oil diluted with potentially toxic tea tree oil DILUTION SUBSTITUTION CONCEALMENT Poultry injected with hormones to conceal disease Harmful food colouring applied to fresh fruit to cover defects Copies of popular foods - not produced with acceptable safety assurances. COUNTERFEITING FOOD FRAUD MISLABELLING Expiry, provenance (unsafe origin) Toxic Japanese star anise labeled as Chinese star anise Mislabeled recycled cooking oil Melamine added to enhance protein value Use of unauthorized additives (Sudan dyes in spices) UNAPPROVED ENHANCEMENTS GREY MARKET PRODUCTION/ THEFT/ DIVERSION Sale of excess unreported product Food Fraud: A Global Concern 7

Top Foods & Ingredients for Fraud Fish Olive Oil Milk Honey * Source: in Development and application of a database of food ingredient fraud and economically motivated adulteration from 1980 to 2010. J.C. Moore et al. (2012), J. of Food Science Vol. 77(4), 118-126. Why is Food Fraud increasing? complex food supply chains Challenging economic times Increasing pressure for unscrupulous suppliers to commit food fraud Food supply is becoming more global 8

Example of Complex Supply Chain The horsemeat scandal Source: www.economie.gouv.fr Example of Rising Price Vanilla: a classic case of supply and demand Current price: 30 / kg But in 2003: prices reached 500 / kg Food fraud risk Tonnes produced Euros/tonne 9

Some Numbers on Food Fraud Over 2,100 records Level of fraud est. 10% Cost to global food industry est. $ 30-40 billion Cost of one incident between 2% to 15% of ann. rev. $400 million impact for a large $10 billion company $60 million impact for a small $500 million company source: UK FSA source: J. Spink, MSU source: GMA The Impact of Food Fraud Impact on business Consumer trust Lost sales Crisis management Impact on consumer Most cases of food fraud not harmful But there are some notable exceptions 10

Global Response Food Related Crime 11

Food Fraud Think Tank - New Concept for GFSI 2014 2015 2013 2012 Think like a Criminal Recommendations by Think Tank Vulnerability Assessments Supply chain mapping Socio-economic Behavioural Geo-political Historical Think like a Criminal Vulnerability Control Plan Monitoring strategy Origin/label verification Specification management Supplier audits Analytical testing strategy Anti-counterfeit technologies 12

GFSI Position - Integral Part of FSMS Food Safety Food Defence Food Fraud Mitgation of unintentional / accidental adulteration Science based Mitigation of intentional adulteration Ideologically motivated Mitigation of intentional adulteration Economically motivated GFSI Position Incorporation of new key elements in Guidance Document Cascade to food safety management schemes via benchmarking process Incorporation in company s food safety management system Many ongoing initiatives on food fraud Leading role for GFSI Direction & Alignment Schemes and companies need time for this new challenge GFSI Position Paper issued in 2014, followed by Incorporation in Version 7 in early 2016 13

Implementation of Food Fraud Mitigation Incorporation in GFSI Guidance Document Vs. 7 (2016) Incorporation in Food Safety Management Schemes Implementation and execution in companies FS Management System Certification via third party audits Current Activities WHAT HOW Requirements Guidelines for implementation 14

Initiative on the HOW Practical guidance Help companies undertake a vulnerability assessment Help companies prepare a plan to control the identified vulnerabilities SSAFE is a non-profit organization aiming to strengthen recognized food protection systems through public private partnerships. For more information visit www.ssafe-food.org/ The Analytical Testing Strategy Vulnerability Assessments Supply chain mapping Socio-economic Behavioural Geo-political Historical Think like a Criminal Vulnerability Control Plan Monitoring strategy Monitoring strategy Origin/label verification Specification management Supplier audits Analytical testing strategy Anti-counterfeit technologies Anti-counterfeit technologies Analytical testing strategy Credits to Michele Lees, Eurofins 15

The Analytical Testing Strategy Credits to Michele Lees, Eurofins Detecting Fraud needs a change in analytical focus Targeted Analysis target list of components we know what to look for and only find what we are looking for Non-Targeted analysis product/ingredient profile we also find what we are NOT looking for Credits to Michele Lees, Eurofins 16

Requirements for SMART Testing: Summary S M Identify vulnerable points in supply chain A WHERE WHEN WHAT Check composition Absence of known adulterants Non-targeted screening Frequency High risk product or random testing program Credits to Michele Lees, Eurofins R T Non-Targeted Screening - Part of an Early Warning Strategy Infrared spectroscopy (NIR, FT-IR..) Specificity High Resolution NMR High Resolution Mass Spectrometry (LC- or GC- hyphenated) Credits to Michele Lees, Eurofins 17

Non-Targeted Screening - Part of an Early Warning Strategy Example: High Resolution NMR as a monitoring tool for milk Cysteine detected indicating addition of protein hydrolysate (from hair, feathers) Credits to Michele Lees, Eurofins Look Beyond the Obvious & Find the Needle in the Haystack! 18

yves.rey@danone.com 19