FOR FOOD SAFETY AND APPLIED NUTRITION AND UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE



Similar documents
Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort

Vulnerability Assessment and Approaches to Food Fraud Prevention

Developing a Food Fraud Prevention Program - Assessing Food Fraud vulnerabilities and how to develop Food Fraud prevention strategies

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

GLOBAL BRAND ASSURANCE YOUR WORLD IS OUR WORLD. TACKLE THE THREAT OF FOOD FRAUD IN YOUR BUSINESS: TRAINING PROGRAMMES In partnership with

A-CAPP Paper Series. Assessing the Risks of Counterfeiting and Illicit Diversion for Health Care Products

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd

Rx-360 Supply Chain Security White Paper: Incident Management

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

How To Prevent Food Fraud

NOT ALL CODES ARE CREATED EQUAL

SUPPLY CHAIN INTEGRITY AND SECURITY

PCI Deadline Are you Complying? Mark Cuneo. CardConnect

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

Food Defense Supplier Guidelines

FOOD FRAUD Threats & Impacts

The new phenomenon of criminal fraud in the food supply chain. The rapid rise of food fraud and the collective responses to the global threat

FOOD FRAUD Vulnerability & Impact

Advancing Online Drug Safety: FDA Perspective

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP

Statement Of. For. U.S. House of Representatives Energy and Commerce Committee Subcommittee on Oversight and Investigations.

How To Transform The Retail And Shopping Experience

Track/Trace Solutions. for the Manufacturing Industry

Educa&onal Event Spring Cyber Security - Implications for Records Managers Art Ehuan

Product Tracing in Food Systems & Mock Traceback IFT Recommendations to FDA. Sarah D. Ohlhorst, MS, RD IFT Staff Scientist

Comments to Notice of Proposed Amendments to Federal Sentencing Guidelines Federal Register: F.R. Doc. E F.R. Publication Date: January 28, 2008

USDA 3 rd Party Audit Verification Programs

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

Mass Serialization and Traceability Implementation in the Pharma Industry. Mathieu Aman, Global Program Lead F. Hoffmann-La Roche Ltd, Switzerland

Identity Theft: Knowingly uses identifying information of another to obtain cash,

Developing Secure Software in the Age of Advanced Persistent Threats

Find the digital fingerprints of fraud in the financial services industry

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Security Guidelines for. Agricultural distributors

Pharmaceutical Distribution Security Alliance (PDSA)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC

Penetration Testing Services. Demonstrate Real-World Risk

Best Practices in the Fight

UNDERSTANDING VULNERABILITY ASSESSMENT

Forum on Microbial Threats Session VII Threat Reduction Research and Policy Opportunities

idata Improving Defences Against Targeted Attack

Trace Register Response to the Presidential Task Force

Identity Theft Awareness and Prevention

APEC Roadmap to Promote Global Medical Product Quality and Supply Chain Integrity Update

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

FSSC ASIA Event 11 November 2015 Tokyo. Petra Wissenburg. Food Safety External Affairs & Strategic Projects Director DANONE GFSI Board Member

September 20, 2013 Senior IT Examiner Gene Lilienthal

Effective Dates and FDA Requirements in the FDA Food Safety Modernization Act Prepared by Hogan Lovells US LLP, February 2011

Enterprise Information Management for the Food and Beverage Industry

Transcript of FDA Press Conference on the Pet Food Recall March 19, 2007 FTS - HHS FDA. Moderator: Cathy McDermott March 19, :00 am CT

FAO/WHO Regional Conference on Food Safety for the Americas and the Caribbean San José, Costa Rica, 6-9 December 2005

DOCUMENT SECURITY ISSUES

It s all about managing food. Food Recall Plan Template For Food Manufacturers

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

ADRIAN DAVIS INFORMATION SECURITY FORUM

GAO FOOD ASSISTANCE. Reducing Food Stamp Benefit Overpayments and Trafficking

MINIMUM QUALIFICATIONS: To be eligible for this position, you must possess the qualifying specialized

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

The SEC's New Whistleblower Program: What It Means for Companies and How to Respond. July 22, 2011

Identity Theft: Informational Workshop

FSIS Security Guidelines for Food Processors

TRACEABILITY IN THE FOOD SUPPLY CHAIN

AGRICULTURE, FOOD AND LIFE SCIENCES SGS OLIVIER COPPEY EXECUTIVE VICE PRESIDENT INVESTORS DAYS, OCTOBER 2015

QR Codes and Other Symbols Seen in Mobile Commerce

U.S. Food and Drug Administration Office of International Programs and International Offices

PREVENTING RETAIL FRAUD. With Data Visualization and Link Intelligence

SCHEMES SCAMS FRAUDS

UNITED STATES OF AMERICA BEFORE THE DEPARTMENTAL APPEALS BOARD CIVIL REMEDIES DIVISION DEPARTMENT OF HEALTH AND HUMAN SERVICES

OIG Fraud Alert Phishing

Presentation of April 22, 2015

The Dow Chemical Company. statement for the record. David E. Kepler. before

Admission Requirements for. Surgical Technology FALL Deadline for all requirements. February 15, 2016

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS

Security and Privacy of Wireless Implantable Medical Devices

DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE

Identity Theft and Strategies for Crime Prevention

This presentation isn t intended to be comprehensive, but hopefully we ll expose you to some new options or new ways of thinking about Threat

Career Opportunities in the Security Industry

Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E.

A New Approach to Assessing Advanced Threat Solutions

Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript

The market leader in ID verification and authentication

Reduce Fraud: Stop Fraudsters Before They Strike

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

How companies leverage quality and quality certifications to achieve competitive advantage

Penetration Testing Service. By Comsec Information Security Consulting

GS1 Healthcare Discussion paper on Mobile Applications and Services in Healthcare

I-Track Software. A state of the art production and warehouse management system designed for Food and Beverage Manufacturers. Overview 2.

The BRC Food Standard today

STRENGTHENING ANTICOUNTERFEITING CANADA

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Keywitness: Towards illicit <> crossborder supply chains -research frameworkto support assessment of research gaps and setting up of

CARVER+Shock Vulnerability Assessment Tool

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

PARTICIPANT HANDBOOK LYON AND CHASE COUNTIES

Transcription:

FDA/CFSAN Transcript Document ID: FDA 2009 N 0523 0009.2 Document Type: OTHER Docket ID: FDA 2009 N 0523 URL: http://www.regulations.gov/search/regs/home.html#documentdetail?r=0900006480a83f60 FOR FOOD SAFETY AND APPLIED NUTRITION AND UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE IMPROVING PRODUCT TRACING OF FOODS: MORE RAPID OUTBREAK RESPONSE DAY 2: SPECIFIC ELEMENTS AND ISSUES IN PRODUCT TRACING AND OUTBREAK RESPONSE December 10, 2009 9:00 a.m. U.S. Department of AgricultureSouth Building, Jefferson Auditorium 1400 Independence Avenue, S.W.Washington, D.C. 20250 MODERATORS: DR. STEPHEN SUNDLOF Center for Food Safety and AppliedNutrition Food and Drug Administration MS. SHERRI A. McGARRY Center for Food Safety and AppliedNutrition Food and Drug Administration Spink transcript comments here: MR. SPINK: Good afternoon. I'd like to thank the Agency for the opportunity to present comments. Also I'd like to applaud the efforts to continue the public private partnership programs in the State of Michigan. We've had a number of excellent engagements, including the Michigan Department of Agriculture's Ag and Food Protection Strategy Steering Committee led by Brad Deacon, Dr. John Tilden, and Jerry Wojtala. I am John Spink. I'm an Assistant Professor and Associate Director of the Anti Counterfeiting and Product Production Program in the School of Criminal Justice at Michigan State University, but my roots are in food safety and packaging.

What do I do? I develop and teach packaging for food safety in the Pro M.S. Food Safety master's program. I teach packaging module of food protection and defense, and I develop and teach the anti counterfeit strategy and product protection course. My research areas involve food fraud or economically motivated adulteration. I study the behavioral sciences behind the chemistry of the crime to focus on the opportunity and reducing the risk by reducing the opportunity. The concept is no different than general food science actions of reducing the amount of pathogen in the food even before the kill step reducing the risk by reducing the opportunity for a risk. In addition, we have just received funding from the National Center for Food Protection and Defense for defining food fraud and the chemistry of the crime. One other. I'm also the U.S. Chair for the Technical Advisory Group for ISO/TC 247, which is fraud controls and countermeasures. That's anti counterfeiting. My comments in general are to include food fraud considerations in the traceability initiative as you include both food safety and food defense. The second main comment is to consider traceability programs integrated across all FDA and all consumer products, including drug, medical device, food, and then all consumer products. It is my opinion that the retailers and retail inventory management systems are a real key node, since this is the last transaction scanning at checkout before the product leaves the distribution system and is transferred to the consumer. For food fraud, it's important to step back from the effect of adulteration to the motivation. While melamine in pet food was a public health threat, the cause or motivation was economic. Actions to reduce the opportunity or to deter should focus on the cause. This concept is presented in the food fraud matrix. It is important to remember that we're dealing with human actors who are trying to not get caught. Their actions are clandestine and stealth. They're actively trying to deceive. The fraudsters will use the very strength and trust of the traceability systems to hide their counterfeit product. The point here is that there are a number of types of fraud or types of counterfeiting, adulterate, that would be melamine in pet food. Tamper, overruns, theft, diversion, simulations, and the traditional micro definition of full counterfeiting. While these stretch the definition of intellectual property rights definition of counterfeiting, these are all key access points for counterfeit or fraud in a product to enter the supply chain. There's three main specific food chain vulnerabilities to food fraud. First, raw ingredients and components. That's the products getting into the supply chain, and then also there's legitimate supply chain products, products that move from a manufacturer

into the marketplace where there's some fraud, whether it's dilution or substandard products incorporated back in the system. There's also product that never enters the proprietary supply chain, a figure that I developed, it's important to demonstrate this. For the open meeting, it is important to identify some of the specific risks and challenges for traceability. Traceability can offer benefits throughout this whole continuum. To define the countermeasure objective, there are specific objectives in grand protection systems. Traceability initiatives can contribute to all. The key is improving transparency. Consider traceability programs integrated across all FDA and all consumer products. In fact, whenever I teach graduate courses, I have the students examine how and when traceability systems of all products will integrate. Finally, in my concluding comments, thank you for the opportunity to present these comments. If you have any questions or comments, I can be reached through Michigan State University, at SpinkJ@msu.edu. Thank you. MS. McGARRY: Thank you, Mr. Spink. Next we have Bob Carpenter, GS1 US, followed by Scott Goltry, American Meat Institute. MR. SPINK: Good afternoon. I'd like to thank the Agency for the opportunity to present comments. Also I'd like to applaud the efforts to continue the public private partnership programs in the State of Michigan. We've had a number of excellent engagements, including the Michigan Department of Agriculture's Ag and Food Protection Strategy Steering Committee led by Brad Deacon, Dr. John Tilden, and Jerry Wojtala. I am John Spink. I'm an Assistant Professor and Associate Director of the Anti Counterfeiting and Product Production Program in the School of Criminal Justice at Michigan State University, but my roots are in food safety and packaging. What do I do? I develop and teach packaging for food safety in the Pro M.S. Food Safety master's program. I teach packaging module of food protection and defense, and I develop and teach the anti counterfeit strategy and product protection course. My research areas involve food fraud or economically motivated adulteration. I study the behavioral sciences behind the chemistry of the crime to focus on the opportunity and reducing the risk by reducing the opportunity. The concept is no different than general food science actions of reducing the amount of pathogen in the food even before the kill step reducing the risk by reducing the opportunity for a risk.

In addition, we have just received funding from the National Center for Food Protection and Defense for defining food fraud and the chemistry of the crime. One other. I'm also the U.S. Chair for the Technical Advisory Group for ISO/TC 247, which is fraud controls and countermeasures. That's anti counterfeiting. My comments in general are to include food fraud considerations in the traceability initiative as you include both food safety and food defense. The second main comment is to consider traceability programs integrated across all FDA and all consumer products, including drug, medical device, food, and then all consumer products. It is my opinion that the retailers and retail inventory management systems are a real key node, since this is the last transaction scanning at checkout before the product leaves the distribution system and is transferred to the consumer. For food fraud, it's important to step back from the effect of adulteration to the motivation. While melamine in pet food was a public health threat, the cause or motivation was economic. Actions to reduce the opportunity or to deter should focus on the cause. This concept is presented in the food fraud matrix. It is important to remember that we're dealing with human actors who are trying to not get caught. Their actions are clandestine and stealth. They're actively trying to deceive. The fraudsters will use the very strength and trust of the traceability systems to hide their counterfeit product. The point here is that there are a number of types of fraud or types of counterfeiting, adulterate, that would be melamine in pet food. Tamper, overruns, theft, diversion, simulations, and the traditional micro definition of full counterfeiting. While these stretch the definition of intellectual property rights definition of counterfeiting, these are all key access points for counterfeit or fraud in a product to enter the supply chain. There's three main specific food chain vulnerabilities to food fraud. First, raw ingredients and components. That's the products getting into the supply chain, and then also there's legitimate supply chain products, products that move from a manufacturer into the marketplace where there's some fraud, whether it's dilution or substandard products incorporated back in the system. There's also product that never enters the proprietary supply chain, a figure that I developed, it's important to demonstrate this. For the open meeting, it is important to identify some of the specific risks and challenges for traceability. Traceability can offer benefits throughout this whole continuum. To define the countermeasure objective, there are specific objectives in grand protection systems. Traceability initiatives can contribute to all.

The key is improving transparency. Consider traceability programs integrated across all FDA and all consumer products. In fact, whenever I teach graduate courses, I have the students examine how and when traceability systems of all products will integrate. Finally, in my concluding comments, thank you for the opportunity to present these comments. If you have any questions or comments, I can be reached through Michigan State University, at SpinkJ@msu.edu. Thank you. MS. McGARRY: Thank you, Mr. Spink.