We take Food Fraud Seriously
Food Fraud Detection
We conduct vulnerability assessment to identify actionable process steps for each type of food manufactured, processed, packed or held at the food facility. For each point, step, or procedure in the facility’s process, these elements must be evaluated:
The severity and scale of the potential impact on public health. This would include such considerations as the volume of product, the number of servings, the number of exposures, how fast the food moves through the distribution system, potential agents of concern and the infectious/lethal dose of each; and the possible number of illnesses and deaths. The degree of physical access to the product. Things to be considered would include the presence of such physical barriers as gates, railings, doors, lids, seals and shields. The ability to successfully contaminate the product.
Mitigation strategy management components
Our mitigation strategy is applied in a directed and appropriate way to protect the actionable process step from an insider attack, would sufficiently minimize the risk of intentional adulteration. Steps are taken to ensure the proper implementation of each mitigation strategy. In each of these areas of food defense, the facilities are given more flexibility in the final rule to establish the actions most appropriate to their operation and product.
- Data Insights: Create data driven mitigation strategies.
- Monitoring: Implement procedures, including frequency with which they are to be performed.
- Corrective actions: The response if mitigation strategies are not properly implemented.
- Audit: Verification activities would ensure that monitoring is being conducted and appropriate decisions about corrective actions are being made.