FOOD FRAUD Vulnerability & Impact



Similar documents
FOOD FRAUD Threats & Impacts

FSSC ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member

Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP

GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES In partnership with

UNDERSTANDING VULNERABILITY ASSESSMENT

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD

DEFENDING YOUR SUPPLY CHAIN: FOOD AUTHENTICIT Y AND INSURANCE

The BRC Food Standard today

How To Prevent Food Fraud

Private Certification to Inform Regulatory Risk-Based Oversight: Discussion Document

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD SAFETY SYSTEM CERTIFICATION FSSC 22000

Rx-360 Supply Chain Security White Paper: Incident Management

AGRICULTURE, FOOD AND LIFE SCIENCES SGS OLIVIER COPPEY EXECUTIVE VICE PRESIDENT INVESTORS DAYS, OCTOBER 2015

Vulnerability Assessment and Approaches to Food Fraud Prevention

FSSC Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART I

Building Global Trust - How effective is your supply chain management programme? Cor Groenveld LRQA Global Product Manager Food Services

Foreword Introduction - The Global Food Safety Initiative (GFSI) Scope Section Overview Normative References...

NimkarTek Technical Services Pvt Ltd

Safer food supply chains why assessments are great news for your business

Kraft Foods Supplier Quality and Food Safety Forum. Kraft Foods Group, Inc.

CGI Cyber Risk Advisory and Management Services for Insurers

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

INFORMATION ON CHANGES IN CPCC AF, CB, F&V, FO, PPM, TE, AB, LB, PY and CROPS RULES IN IFA VERSION Publication 1 st July 2016

WEEK 10: CASE STUDY. MIS 3537: Internet and Supply Chains

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

quality, health & safety and environment training and consulting

EXECUTIVE SAFETY LEADERSHIP

Qingxin Chen University of Central Lancashire, Preston, UK

Business Principles September 2014

Western Australian Auditor General s Report. Information Systems Audit Report

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer

PRIVACY BREACH MANAGEMENT POLICY

Cyber Security Evolved

Who s next after TalkTalk?

Third Party Audits and Certifications

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Effective Supply Chain Management

How To Manage Risk On A Scada System

The new phenomenon of criminal fraud in the food supply chain. The rapid rise of food fraud and the collective responses to the global threat

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

UNDERSTANDING THE FSSC FOOD SAFETY SYSTEM CERTIFICATION STANDARD

Changing Tastes The UK Soft Drinks Annual Report 2015

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

Cutting through the insurance jargon!

TELEFÓNICA UK LTD. Introduction to Security Policy

THE SEVEN KEY CHALLENGES OF CONDUCT RISK MANAGEMENT WHITE PAPER

Cyber security Building confidence in your digital future

CONCEPTS OF FOOD SAFETY QUALITY MANAGEMENT SYSTEMS. Mrs. Malini Rajendran

Developing an Effective Enterprise Risk Management Program

HIGH ON THE RISK RADAR REPUTATION RISK

Difficult art of managing company s reputation

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Canada s Organic Market National Highlights, 2013

Address C-level Cybersecurity issues to enable and secure Digital transformation

The Positive Impact of Supplier Quality Management. Best Practices and Practical Insights for 2015

The Asset Management Landscape

March 2013 Baiada Poultry PTY LTD

I S O I E C I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

THE US FOREIGN CORRUPT PRACTICES ACT ( FCPA ) COMPLIANCE POLICY AND GUIDELINES

Eating Right for Kidney Health: Tips for People with Chronic Kidney Disease

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

FOOD SAFETY SYSTEM CERTIFICATION FSSC 22000

Overview of GFSI and Accredited Certification

Fraud Prevention Policy

A NEW APPROACH TO CYBER SECURITY

SUPPLY CHAIN INTEGRITY AND SECURITY

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer

The Sustainable Soy Sourcing Guidelines Second Edition

Recent Developments in GMP s & HACCP

FOOD SAFETY SYSTEM CERTIFICATION FSSC 22000

How To Protect Your Business From A Cyber Attack

Food Traceability Best Practices in the Age of Big Data

BENENDEN HOSPITAL TRUST JOB DESCRIPTION

CIPS Sustainable procurement review

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

Save Time and Money at the Grocery Store

Cyber Security. John Leek Chief Strategist

Canada s Organic Market National Highlights, 2013

Identifying and managing environmental risks in the maritime sector

16 Very Important THINGS YOU NEED TO KNOW About Cancer Cells

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Shell s Health, Safety and Environment (HSE) management system (see Figure 11-1) provides the framework for managing all aspects of the development.

National Cyber Security Policy -2013

How to Develop Successful Enterprise Risk and Vendor Management Programs

Current issues and trends in the Aerospace supply chain

Contact address: Global Food Safety Initiative Foundation c/o The Consumer Goods Forum 22/24 rue du Gouverneur Général Eboué Issy-les-Moulineaux

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Every link may trigger a chain reaction. Consumers reward brands that care. MANAGING RISK

Transcription:

FOOD FRAUD Vulnerability & Impact THE INDUSTRY S RESPONSE Aldin Hilbrands, Royal Ahold

Outline Food Fraud Types Drivers Impact Food Industry s Response

Food Fraud in the Context of Food Safety Economically driven Motivation is GAIN Intentional adulteration Food Fraud Food Quality Food Defense Ideologically driven Motivation is HARM Unintentional / accidental adulteration Food Safety Science based Food borne illness

Terminology Sunflower oil partially substituted with mineral oil Hydrolyzed leather protein in milk Watered down products using non-potable / unsafe water Olive oil diluted with potentially toxic tea tree oil DILUTION SUBSTITUTION CONCEALMENT Poultry injected with hormones to conceal disease Harmful food colouring applied to fresh fruit to cover defects Copies of popular foods - not produced with acceptable safety assurances. COUNTERFEITING FOOD FRAUD MISLABELLING Expiry, provenance (unsafe origin) Toxic Japanese star anise labeled as Chinese star anise Mislabeled recycled cooking oil Melamine added to enhance protein value Use of unauthorized additives (Sudan dyes in spices) UNAPPROVED ENHANCEMENTS GREY MARKET PRODUCTION/ THEFT/ DIVERSION Sale of excess unreported product

Food Fraud: A Global Concern

Top Foods & Ingredients for Fraud Fish Olive Oil Milk Honey * Source: in Development and application of a database of food ingredient fraud and economically motivated adulteration from 1980 to 2010. J.C. Moore et al. (2012), J. of Food Science Vol. 77(4), 118-126.

Why is Food Fraud increasing? complex food supply chains Challenging economic times Increasing pressure for unscrupulous suppliers to commit food fraud Food supply is becoming more global

Example of Complex Supply Chain The horsemeat scandal Source: www.economie.gouv.fr

Example of Rising Price Vanilla: a classic case of supply and demand Current price: 30 / kg But in 2003: prices reached 500 / kg Food fraud risk Tonnes produced Euros/tonne

Some Numbers on Food Fraud Over 2,100 records Level of fraud est. 10% Cost to global food industry est. $ 30-40 billion Cost of one incident between 2% to 15% of ann. rev. source: UK FSA source: J. Spink, MSU source: GMA

The Impact of Food Fraud Impact on business Consumer trust Lost sales Crisis management Impact on consumer Most cases of food fraud not harmful But there are some notable exceptions

Global Response

Food Fraud Think Tank - New Concept for GFSI 2014 2015 2013 2012 Think like a Criminal

Recommendations by Think Tank Vulnerability Assessments Supply chain mapping Socio-economic Behavioural Geo-political Historical Think like a Criminal Vulnerability Control Plan Monitoring strategy Origin/label verification Specification management Supplier audits Analytical testing strategy Anti-counterfeit technologies

GFSI Position - Integral Part of FSMS Food Safety Food Defence Food Fraud Mitigation of unintentional / accidental adulteration Science based Mitigation of intentional adulteration Ideologically motivated Mitigation of intentional adulteration Economically motivated

GFSI Position Incorporation of new key elements in Guidance Document Cascade to food safety management schemes via benchmarking process Incorporation in company s food safety management system Many ongoing initiatives on food fraud Leading role for GFSI Direction & Alignment Schemes and companies need time for this new challenge GFSI Position Paper issued in 2014, followed by Incorporation in Version 7 in early 2016

Implementation of Food Fraud Mitigation Incorporation in GFSI Guidance Document Vs. 7 (2016) Incorporation in Food Safety Management Schemes Implementation and execution in companies FS Management System Certification via third party audits

Current Activities WHAT HOW Requirements Guidelines for implementation

Initiative on the HOW Practical Tool Help companies undertake a vulnerability assessment Help companies prepare a plan to control the identified vulnerabilities SSAFE is a non-profit organization aiming to strengthen recognized food protection systems through public private partnerships. For more information visit www.ssafe-food.org/

Structure of the Food Fraud Vulnerability Assessment tool

What s next? FF Vulnerability tool (Q1 2015) FF Auditor competence reqts (Q1 2015) GFSI Guidance Document v7 (Q1 2016) FF & FD Key elements Auditor competency requirements for FF & FD Re-benchmarking certification schemes (2016) Supplier certification audits (2016) Be prepared to protect your own brand reputation and liability