Last week we were joined by experts in pest management for Episode 2 of the 2020 Food Safety Consortium Virtual Conference Series. Although pest management may not be seen as the most exciting topic, all food plants are required to have an integrated pest management program. In addition, the digital transformation fast-tracked by COVID-19 is also driving innovation in the remote monitoring of pests.
Barney Debnam, global agriculture strategy lead at Microsoft kicked off the conversation with some key themes driving change within the global food system, which have also been accelerated by COVID: Geopolitical forces, consumerization, democratized biology, sustainability, shifting economics and food security. As technology continues to evolve and is adopted at a faster pace (think artificial intelligence and how accessible it is now), businesses will be able to transform their outcomes by becoming more predictive. The key technology enablers in the process include:
Internet of Things and edge computing
Artificial intelligence and cognitive computing
The most significant benefit of implementing technology such as remote monitoring into an IPM program is its ability to provide visibility and the data to back up what is happening in a facility.
With significant clusters of COVID-19 infection among employees—16,000 cases and 86 deaths documented by the CDC through May 2020 — the food processing and distribution industry faces significant challenges in reopening their facilities and ramping up to full capacity. Technology for health and safety access governance and intelligence, along with guidelines from the CDC and OSHA, can help support food companies in the automation of certain compliance activities and a safe return-to-work strategy.
Designated part of the essential critical infrastructure by the federal government at the onset of the pandemic in the spring of 2020, the food supply chain needs active solutions to protect its workforce. But there’s more to this back-to-work transition. Workers need to feel safe and trust that new security, safety and compliance processes have their best interests in mind—transferring to an overall positive experience with their employer.
In the age of contagion, the food industry requires ways to communicate better with the workforce, identify and isolate areas of contagion and also deal with the lingering presence of potential bioterrorism, insider threat and cyber-attack. It’s a multi-faceted and complex workspace we’re reentering, one that takes coordination of technology, people and processes. Without it, food suppliers risk plant shutdowns and loss of business continuity.
Bioterrorism and insider threat remain an active part of the supply chain landscape. In fact, according to a June 2020 Wall Street Journal Pro Research Survey of cybersecurity executives at nearly 400 companies, 67% were concerned about malicious insiders. Remote workers and lax controls have exacerbated the situation and rising threats include malicious employees, accidental negligence, contractor or vendor misuse and account compromise.
The Landscape of Collaboration
The ongoing coordination between human resources (HR) and security is a collaborative effort that bolsters food defense in a COVID-19 world. Fueled by digital transformation, converged physical security and HR management solutions are wound together tightly in a coordinated and analytical approach to keep food industry employees safe and operations running smoothly.
These departments, once siloed and co-existing without direct interaction, are benefiting from software’s move to the cloud and open operating platforms, which provides increased opportunity for real-time integration of HR, security and facilities technologies. Moving to a converged approach across all departments, including HR, IT/cyber and operational technology (OT)/SCADA—can effectively secure our most critical food production and distribution resources while actively enforcing compliance and company policies, including COVID-19 mandates. In addition, physical security access governance, in a holistic manner, protects food industry workers and processes from compromised identities, systems and insider threats.
HR and physical security now have the ability to share data-insights to prevent, detect and mitigate the spread of contagions. With this convergence, organizations have the information they need to actively defend and protect the workforce, focusing on the human side of security to yield a positive experience.
Enabling a Safe and Healthy Return to Work
This time of unprecedented change has triggered a tectonic shift in the way organizations have been dealing with the health, security and safety of their workforce. Sensing a coming tsunami, HR, corporate real estate and physical security leaders are realizing that they must stop operating in silos and embrace a holistic approach. Enterprise response and recovery plans have become a major catalyst for converged security, as it has proven to be the most effective way to manage workspace access, enforce workforce security, safety and privacy.
Reopening with Technology at Your Back
Physical identity access management (PIAM) software, including visitor identity management (VIM) are convergence platforms that deliver identity and access governance, health and safety intelligence and compliance validation across the enterprise. PIAM provides a safer work environment by managing physical, logical and operational technology access for employees and visitors, actively enforcing company policies, compliance and industry regulations with built-in best practices and regulatory controls. Automated policy-driven background checks yield real-time vetting of visitors, contractors and employees while validating and identifying any policy violations. PIAM and VIM keeps facilities and workers safe, making sure the employees and visitors only have access to the areas, data and assets they need, including vital food processing areas where deliberate sabotage needs to be kept at bay.
While prevention of bioterrorism and insider threat is ongoing at food distribution, production and processing facilities there’s been a notable shift during the pandemic that focuses on the health and safety of workers. Security is no longer simply about keeping the bad guys out; it’s about safety and protecting workers from unsafe behavior.
Workforce health and safety access governance software solutions help organizations open safely in a frictionless, controlled and secure way by automating and enforcing COVID-19 related policies and procedures. Automated batch email/text notifications with self-service links send requests to the remote workforce for self-attestation and self-reporting offsite and enable access by the worker to the facility based on health, travel and other company policies.
Here’s how it works: An employee completes the self-reporting health and travel questionnaire through a mobile app, which triggers automated workflows based on those answers. These health questionnaires collect data and document employee activity during lockdown, including infection, symptoms or exposure. The employee’s self-attestation request comes to the manager for action, and based on answers the worker is considered high risk and per policy their access to the facility is revoked for 14 days while they are in quarantine. A similar self-attestation and workflow then applies to reinstatement for the employee. This reporting and workflow can be configured specifically to the facility. Enterprises can further customize their visitor identity management to provide clear communication of current policies during the outbreak, reinforcing WHO best practices.
Focus on Health and Safety
Health and safety access governance and intelligence provides prescreening support of workforce site entry with automated policy enforcements. Pre-registered and onsite visitors/contractors check-in/check-out with prescreening, watch list and other checks prior to access. In the production or distribution facility, health and safety analytics track confirmed or potentially exposed COVID-19 workers, identify exposed areas for lockdown and/or sanitization, social distancing violation, location heat map and other actionable health & safety analytics.
PIAM also allows you to automate your communications and deliver clear expectations and procedures to your workforce, visitors and contractors pre-visit and onsite—adding to a seamless experience.
Security convergence delivers a comprehensive, holistic solution across the entire food value chain, from sourcing to production to retail distribution. Human resources and physical security have teamed up—yielding real-time data that can prevent, detect and mitigate the spread of contagions. With this convergence comes greater situational awareness that defends and protects the workforce, with a strong focus on safety and building trust between worker and employer.
The novel coronavirus (COVID-19) has been quickly spreading across the globe, which triggered most affected countries to officially declare a state of public health emergency. The World Health Organization (WHO) has labeled this rather fast outbreak as pandemic. Food companies were urged to apply proper hygiene practices such as regular handwashing and surface cleaning to keep the risk of contagion at its lowest level.1 At the moment, there are many ongoing clinical trials evaluating potential treatments for COVID-19 but no specific vaccine or medicine have been publicly made available, as of this writing.
COVID-19 belongs to a family of viruses that cause respiratory issues and can be passed on directly through contact with an infected person’s body fluids (i.e, cough or sneeze discharge) and indirectly, through contact with contaminated surfaces.2 But can the virus be transmitted through edible goods?
Coronavirus Transmission through Food
According to the CDC, there is no current indication to support the transmission of COVID-19 through food since, in general, it needs a living host on which to grow. However, sharing food and beverages, especially in public places, is discouraged. Moreover, good food safety practices are highly recommended, including refrigerating, keeping raw and cooked goods separated and heating food at suitable temperature (around 75 ̊ C).3
If the consumed food is hypothetically contaminated with the virus, the stomach acid (due to its acidic nature) will immediately inactivate it. In addition, COVID-19 cannot affect the body internally via the intestines. One rare exception to the previous statement occurs when the virus gets in contact with a specific type of respiratory cells.
According to food safety experts, foodborne illnesses are generally caused by bacterial cells that have the ability to grow in food and multiply rapidly within a short amount of time. On the other hand, viruses are dormant particles floating around living cells; only when they successfully breaks into the aforementioned cells, the multiplication process can take place.1,3
General Food Safety Advice for Food Businesses
Food manufacturers must follow good hygiene and safety practices to help ensure the consistent quality and safety of their products:4,5,6
Purchase raw material from reputable sources
Cook food thoroughly and maintain safe holding temperatures
Clean and sanitize surfaces (such as cooking boards, refrigerators handles, etc.) and equipment
Properly train staff in taking extreme hygiene measures
Employees showing signs of infectious illness must not attend work
Implement appropriate risk management strategies (e.g,. encourage social distancing and endorse online meetings when applicable)
Number of staff in a kitchen or food preparation area should be kept to a bare minimum
Space out workstations and food preparation areas, when possible
Modern food supply chains are inherently complex, with products typically passing through multiple suppliers and distributors, as well as countries and continents, before they end up on the supermarket shelf. While global supply chains offer consumers greater choice and convenience, they also make protecting the security of food products more challenging. With additional stakeholders between farm and fork, products are exposed to an elevated risk of biological or chemical contamination, as well as food counterfeiting and adulteration challenges—potentially putting consumer health and brand reputation in jeopardy.
Given the importance of maintaining the safety, quality and provenance of food products, global regulatory bodies are placing the integrity of supply chains under increased scrutiny. In the United States, for example, the adoption of FSMA moved the focus from responding to foodborne illnesses to preventing them by prioritizing comprehensive food testing measures, enforcing inspections and checks, and enabling authorities to react appropriately to safety issues through fines, recalls or permit suspensions.1 Similarly, China’s revised Food Safety Law (known as FSL 2015) is widely considered to be the strictest in the country’s history, and seeks to drive up quality standards by empowering regulators, and enhancing traceability and accountability through robust record-keeping. 2 The European Union continues to closely regulate and monitor food safety through its General Food Law, which is independently overseen by the European Food Safety Authority from a scientific perspective.
Achieving the Highest Standards of Food Security, Integrity and Traceability
For producers, manufacturers and distributors, the heightened regulatory focus on the security and integrity of the food supply chain has placed additional emphasis on accurate record-keeping, transparent accountability and end-to-end traceability. To meet the needs of the modern regulatory landscape, food chain stakeholders require robust systems and tools to manage their quality control (QC), environmental monitoring and chain of custody data. Despite this, many businesses still handle this information using paper-based approaches or localized spreadsheets, which can compromise operational efficiency and regulatory compliance.
The fundamental flaw of these traditional data management approaches is their reliance on manual data entry and transcription steps, leaving information vulnerable to human error. To ensure the accuracy of data, some companies implement resource-intensive verification or review checks. However, these steps inevitably extend workflows and delay decision-making, ultimately holding up the release of products at a high cost to businesses. Moreover, as paper and spreadsheet-based data management systems must be updated by hand, they often serve merely as a record of past events and are unable to provide insight into ongoing activities. The time lag associated with recording and accessing supply chain information means that vital insight is typically unavailable until the end of a process, and data cannot be used to optimize operations in real-time.
Furthermore, using traditional data management approaches, gathering information in the event of an audit or food safety incident can be extremely challenging. Trawling through paperwork or requesting information contained in spreadsheets saved on local computers is time-consuming and resource-intensive. When it comes to establishing accountability for actions, these systems are often unable to provide a complete audit trail of events.
Digital Solutions Transform Food Security and Compliance
Given the limitations of traditional workflows, food supply chain stakeholders are increasingly seeking more robust data management solutions that will allow them to drive efficiency, while meeting the latest regulatory expectations. For many businesses, laboratory information management systems (LIMS) are proving to be a highly effective solution for collecting, storing and sharing their QC, environmental monitoring and chain of custody data.
One of the most significant advantages of managing data using LIMS is the way in which they bring together people, instruments, workflows and data in a single integrated system. When it comes to managing the receipt of raw materials, for example, LIMS can improve overall workflow visibility, and help to make processes faster and more efficient. By using barcodes, radiofrequency identification (RFID) tags or near-field communication, samples can be tracked by the system throughout various laboratory and storage locations. With LIMS tracking samples at every stage, ingredients and other materials can be automatically released into production as soon as the QC results have been authorized, streamlining processes and eliminating costly delays.
By storing the standard operating procedures (SOPs) used for raw material testing or QC centrally in a LIMS, worklists, protocols and instrument methods can be automatically downloaded directly to equipment. In this way, LIMS are able to eliminate time-consuming data entry steps, reducing the potential for human error and improving data integrity. When integrated with laboratory execution systems (LES), these solutions can even guide operators step-by-step through procedures, ensuring SOPs are executed consistently, and in a regulatory compliant manner. Not only can these integrated solutions improve the reliability and consistency of data by making sure tests are performed in a standardized way across multiple sites and testing teams, they can also boost operational efficiency by simplifying set-up procedures and accelerating the delivery of results. What’s more, because LIMS can provide a detailed audit trail of all user interactions within the system, this centralized approach to data management is a robust way of ensuring full traceability and accountability.
This high level of operational efficiency and usability also extends to the way in which data is processed, analyzed and reported. LIMS platforms can support multi-level parameter review and can rapidly perform calculations and check results against specifications for relevant customers. In this way, LIMS can ensure pathogens, pesticides and veterinary drug residues are within specifications for specific markets. With all data stored centrally, certificates of analysis can be automatically delivered to enterprise resource planning (ERP) software or process information management systems (PIMS) to facilitate rapid decision-making and batch release. Furthermore, the sophisticated data analysis tools built into the most advanced LIMS software enable users to monitor the way in which instruments are used and how they are performing, helping businesses to manage their assets more efficiently. Using predictive algorithms to warn users when principal QC instruments are showing early signs of deterioration, the latest LIMS can help companies take preventative action before small issues turn into much bigger problems. As a result, these powerful tools can help to reduce unplanned maintenance, keep supply chains moving, and better maintain the quality and integrity of goods.
While LIMS are very effective at building more resilient supply chains and preventing food security issues, they also make responding to potential threats much faster, easier and more efficient. With real-time access to QC, environmental monitoring and chain of custody data, food contamination or adulteration issues can be detected early, triggering the prompt isolation of affected batches before they are released. And in the event of a recall or audit, batch traceability in modern LIMS enables the rapid retrieval of relevant results and metadata associated with suspect products through all stages of production. This allows the determination of affected batches and swift action to be taken, which can be instrumental in protecting consumer safety as well as brand value.
Using LIMS to Protect Security and Integrity of the Food Supply Chain
Increasingly, LIMS are helping businesses transform food security by bringing people, instruments and workflows into a single integrated system. By simplifying and automating processes, providing end-to-end visibility across the food supply chain, and protecting the integrity of data at every stage, these robust digital solutions are not only helping food supply chain stakeholders to ensure full compliance with the latest regulations; they are enabling businesses to operate more efficiently, too.
Strictly Necessary Cookies
Strictly Necessary Cookies should be enabled at all times so that we can save your preferences for these cookie settings.
We use tracking pixels that set your arrival time at our website, this is used as part of our anti-spam and security measures. Disabling this tracking pixel would disable some of our security measures, and is therefore considered necessary for the safe operation of the website. This tracking pixel is cleared from your system when you delete files in your history.
If you visit and/or use the FST Training Calendar, cookies are used to store your search terms, and keep track of which records you have seen already. Without these cookies, the Training Calendar would not work.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
A browser cookie is a small piece of data that is stored on your device to help websites and mobile apps remember things about you. Other technologies, including Web storage and identifiers associated with your device, may be used for similar purposes. In this policy, we say “cookies” to discuss all of these technologies.
Data generated from cookies and other behavioral tracking technology is not made available to any outside parties, and is only used in the aggregate to make editorial decisions for the websites. Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent by visiting this Cookies Policy page. If your cookies are disabled in the browser, neither the tracking cookie nor the preference cookie is set, and you are in effect opted-out.
In other cases, our advertisers request to use third-party tracking to verify our ad delivery, or to remarket their products and/or services to you on other websites. You may opt-out of these tracking pixels by adjusting the Do Not Track settings in your browser, or by visiting the Network Advertising Initiative Opt Out page.
You have control over whether, how, and when cookies and other tracking technologies are installed on your devices. Although each browser is different, most browsers enable their users to access and edit their cookie preferences in their browser settings. The rejection or disabling of some cookies may impact certain features of the site or to cause some of the website’s services not to function properly.
The use of online tracking mechanisms by third parties is subject to those third parties’ own privacy policies, and not this Policy. If you prefer to prevent third parties from setting and accessing cookies on your computer, you may set your browser to block all cookies. Additionally, you may remove yourself from the targeted advertising of companies within the Network Advertising Initiative by opting out here, or of companies participating in the Digital Advertising Alliance program by opting out here.