We take Food Fraud Seriously 

Certain products continue to be prone to fraudulent adulteration. These include herbs and spices (especially ground spices), dairy products (in certain parts of the world), honey, and olive oil (especially extra virgin). Food products that carry a label denoting certain production practices (such as organic) have also been documented as fraud prone over recent years.

Food Fraud Detection 

Fraud detection of food requires a range of analytical techniques and methods. These may range from fairly standard food nutrient evaluations and visual observation to advanced analytical chemistry, genomic, and microscopy techniques. The techniques used to detect food fraud continue to evolve as perpetrators adapt their adulteration methods to fool the improving testing methods.

 

We conduct vulnerability assessment to identify actionable process steps for each type of food manufactured, processed, packed or held at the food facility.  For each point, step, or procedure in the facility’s process, these elements must be evaluated:

The severity and scale of the potential impact on public health. This would include such considerations as the volume of product, the number of servings, the number of exposures, how fast the food moves through the distribution system, potential agents of concern and the infectious/lethal dose of each; and the possible number of illnesses and deaths. The degree of physical access to the product. Things to be considered would include the presence of such physical barriers as gates, railings, doors, lids, seals and shields. The ability to successfully contaminate the product.

    Mitigation strategy management components 

    Our mitigation strategy is applied in a directed and appropriate way to protect the actionable process step from an insider attack, would sufficiently minimize the risk of intentional adulteration. Steps are taken to ensure the proper implementation of each mitigation strategy. In each of these areas of food defense, the facilities are given more flexibility in the final rule to establish the actions most appropriate to their operation and product.

    • Data Insights: Create data driven mitigation strategies. 
    • Monitoring: Implement procedures, including frequency with which they are to be performed. 
    • Corrective actions: The response if mitigation strategies are not properly implemented.
    • Audit: Verification activities would ensure that monitoring is being conducted and appropriate decisions about corrective actions are being made.