Tag Archives: mitigation plan

Food Safety Consortium

2020 FSC Episode 7 Preview: Food Fraud

By Food Safety Tech Staff
No Comments
Food Safety Consortium

This week’s episode of the 2020 Food Safety Consortium Virtual Conference Series will focus on food integrity from the perspective of issues surrounding food fraud. The following are some highlights:

  • Food Fraud Vulnerability Assessment and Mitigation Plan, with Steve Sklare, Food Safety Academy; Karen Everstine, Ph.D., Decernis; and Peter Begg, Glanbia Nutritionals
  • Food Fraud Case History: Glanbia Nutritionals, with Peter Begg, Glanbia Nutritionals
  • Public Standards—Protecting the Integrity of the Food Supply Chain, with Steven Gendel, Ph.D., Food Chemicals Codex
  • Monitoring and Predicting Food Safety and Fraud Risks in Challenging Times, with Giannis Stoitsis, Agroknow

The event begins at 12 pm ET. Haven’t registered? Follow this link to the 2020 Food Safety Consortium Virtual Conference Series, which provides access to 14 episodes of critical industry insights from leading subject matter experts! We look forward to your joining us virtually.

Melody Ge
FST Soapbox

Compliance with the Intentional Adulteration Rule: Using FMEA for Your Vulnerability Assessment

By Melody Ge
No Comments
Melody Ge

What is FMEA? What is a vulnerability assessment (VA)? How can these two be linked? Despite what you may think, there are similarities between these two methods. FMEA (Failure Modes and Effects Analysis) methods can be utilized to help objectively assess the vulnerable steps within your process.

After July 26, 2019, businesses other than small and very small businesses (defined by FDA) must comply with the FSMA Intentional Adulteration (IA) Rule. The rule is intended to enforce industry regulation to conduct vulnerability assessments and address proper mitigation plans to prevent any potential fraud risks within the food defense plan. For small businesses, the compliance date is July 27, 2020; for very small businesses, the compliance date is July 26, 2021.

Although the IA rule does not specify a particular method that you must use to conduct your VA and address proper mitigation plans, the following elements must be considered during your evaluation and mitigation strategy and must be implemented at each actionable step afterwards:

  • The potential public health impact (e.g., severity and scale) if a contaminant were added (21 CFR 121.130(a)(1))
  • The degree of physical access to the product (21 CFR 121.130(a)(2))
  • The ability of an attacker to successfully contaminate the product (21 CFR 121.130(a)(3))

During the 2019 Food Safety Consortium, Melody Ge will present: How to prepare ourselves in this data-driven transitioning time for the smart food safety era? | October 2 @ 10 am FMEA is a Six Sigma method widely used in operations when implementing a new process. It is a structured approach to discover potential failures that may exist within the design of a product or process. Within FMEA, the RPN (Risk Priority Number) score is used to prioritize risks and is calculated by Severity × Occurrence × Detection. RPN is a quantified number that helps you prioritize risks when determining actions. If we employ the same mentality, FMEA is a useful method in helping to identify vulnerable steps based on the risk within your process. Take a close look at how the RPN is generated; the following three components are also important during the vulnerability assessment.

Severity or the potential public health impact (e.g., severity and scale) if a contaminant were added.
Severity is identified when considering the consequence of when a processing step goes out of control; or thinking about the severity of the health impact. We can consider those impacts or consequences using four common categories:

  • Biological contaminants
  • Chemical contaminants
  • Physical contaminants
  • Intentional adulteration for economic gain contaminants

Occurrence or the degree of physical access to the product.

Occurrence is identified when considering how frequently a process step is expected to go out of defined controls. Is it once a week or once a month? Depending on how often the step goes out of defined controls, this will trigger different action steps as well as mitigation plans.

Detection or the ability of an attacker to successfully contaminate the product.

Detection is considered by how easy it can be detected when the failure occurs. For example, within the food production operation, mixing steps is relatively easier than a CIP step to be detected. More references could be found in FDA’s definition of KAT (Key Activity Types, as discussed in the draft guidance, “Mitigation Strategies to Protect Food Against Intentional Adulteration”), such as:

  • Bulk and liquid receiving and storage
  • Liquid storage and handling
  • Secondary ingredient handling
  • Mixing and similar activities

Once the RPN is identified, then the vulnerable steps can be sorted based on the RPN. To utilize this approach, Table 1 provides a template to be considered using FMEA for the vulnerability assessment.

Process Step Description Is it KAT? (Y/N) RPN Action Process Step Mitigation Strategy Explanation
Sev Occ Det RPN
Table 1: Determine the vulnerable steps (for reference)

As IA rules regulate, a mitigation plan must be generated once a vulnerable step is identified. The intention of the plan shall ensure those risks identified are mitigated and controlled so that the final finished products are not impacted or contaminated. One tip to begin this process is to start with reviewing your current control plan for potential food safety risks. As FSMA Preventive Controls are fully implemented, all food plants shall have a food safety plan in place with validated control plans that are intended to reduce risks for potential physical, chemical, biological and adulteration for economic gain. Sometimes, these risks are highly associated with potential vulnerable steps for intentional adulteration, especially those processing steps associated with potential economic gain hazards. If those controls are not working properly, then we can seek out other mitigation plans. Nevertheless, regardless of what steps are taken, they have to be validated to show that the IA risks are effectively mitigated. Monitoring and verification shall be conducted as well once the mitigation plan is implemented.

Of course, like all food safety management systems, every food plant should have its own designated plans based on the products being produced, operations implemented and the nature of the production. Ultimately, it will be your choice to find an effective method that fits your production culture. However, the intention should always be in compliance with the IA rules: Identify the vulnerable steps within the process, and conduct mitigation plans to control the risks of intentional adulteration.