Tag Archives: security

Tatiana Bravo, INTURN
FST Soapbox

Looking Ahead: The Digital Supply Chain and Fast-Moving Consumer Goods

By Tatiana Bravo
No Comments
Tatiana Bravo, INTURN

The global supply chain is changing. The fast-moving supply chains that power many of the world’s top businesses are being transformed before our very eyes, as companies all over the globe compete to beat their competitors through digitalization.

What we’re now seeing is the emergence of a digital supply chain, with processes powered by innovative and exciting new ideas turned into software.

As we look ahead to the coming months and years, we can expect to see incredible changes affecting the supply chains of all manner of businesses. In fact, we’d go so far as to say that any business that’s serious about competing on the global stage will have no choice but to embrace these innovations and go digital.

So, what exactly can we expect to see from the digital supply chain in the near future, and how might these changes affect fast-moving consumer goods?

Advanced Analytics

The potential of analytics is incredible, particularly when you look at supply chains.

Recent years have seen data rise to the forefront of many business leaders’ concerns. Increasing numbers of companies have started to pick up on the impact that informative data can have on their strategies, and ultimately their chances of ongoing success in the marketplace.

The supply chain is no exception to this rule. As the power of analytical software improves, businesses will be clamoring to gain access to, and make use of, the huge amount of data that’s now available.

We’re likely to see those managing data put under increasing amounts of pressure to use that data effectively, helping to inform decisions that impact supply chain processes and limit wastage. This data will also be invaluable in determining the real impact of critical supply chain decisions and informing future strategies.

The Emergence of AI
AI is the next big thing in business, and it’s set to transform the way the digital supply chain works. Artificial intelligence is now emerging as a hugely powerful tool, capable of helping businesses to make the right decisions for their supply chains.

As the potential of AI improves, we can expect to see its impact felt more widely throughout global supply chains. Look out for AI being used to inform businesses on changing customer preferences, disruptions in supply chains, increasing costs and other obstacles to product delivery. Artificial intelligence will predict future problems before they occur, giving business owners plenty of time to steer clear of potential pitfalls and keep things moving.

AI will also prove invaluable when it comes to anticipating the purchasing habits of existing customers and establishing the value of new leads and potential purchasers. If used effectively, this information could have a dramatic impact on the success of a wide range of different businesses—particularly those focused on fast-moving consumer goods.

Automation of Supply Chain Tasks

Automation itself isn’t a new idea, but the way it’s being used in digital supply chains is.

In the coming months and years, we’re likely to see automation transform the way supply chains work. The automation of processes will help businesses to cut costs, improve efficiency and eliminate any skills gaps by which they may be affected.

Supply chain tasks are being automated with the help of something called robotic process automation, or RPA. This form of automation is even smarter than traditional automated processes.

Informed by software bots or AI, RPA is a significant step forward in the world of digital supply chains. It’s highly scalable, incredibly effective and, importantly, it’s been proven to be hugely reliable. So, even businesses dedicated to the very highest standards of quality are now beginning to automate processes using RPA.

Climate Change Challenges

Climate change continues to be a hot topic in the news, and supply chains are likely to feel the impact of these concerns.

Consumers’ purchasing habits are increasingly led by environmental considerations. It’s therefore important that companies consider the environmental impact of their supply chain processes and provide visibility on these, for those who have an interest.

It’s expected that issues surrounding sustainability will become ever more critical in the future. Inevitably, supply chains will be impacted. Companies making use of digitalization will be best placed to prepare for the challenges of sustainability, reducing waste and making speedy adjustments to their processes as and when required.

A Shift in Transportation

The digitalization of supply chain processes has given ecommerce companies and online retailers the edge over traditional high street retailers. And this has led to a shift towards online shopping, which shows no sign of waning. As we continue into 2020 and beyond, we can expect to see more and more consumers choosing to shop online, and that’s going to have a knock-on effect on the transportation of goods.

Experts are predicting a transportation crunch, when demand begins to outstrip the availability of transport for online goods. This is likely to lead to a shift in how goods are transported, which could well align with changes to logistics designed to improve sustainability and reduce the carbon footprint of products.

Changes in Trade Agreements

Changes in trade agreements between many of the world’s leading economies are likely to impact supply chains in the future. With Brexit looming and trade issues between the United States and China continuing, it’s important that companies remain aware of how political decisions might affect the way they work.

Digital supply chains provide enhanced flexibility for companies, enabling organizations to quickly adapt to changes that could be outside of their control. So, companies that continue to provide a fast and reliable service despite changing trade agreements could well gain an edge over less efficient competitors as time goes on.

Companies making full use of digitalization will be best placed to make the most of new opportunities, and avoid supply chain disruption as a result of changing trade agreements.

Security Concerns

While businesses are beginning to realize the potential of the data that’s now available to them, consumers too are opening their eyes to the data that they share with the world. And this increased awareness has led to consumers being newly concerned about the data they reveal, and how secure that data is once it’s been shared.

Companies looking to make full use of the digitalization of supply chain processes will be incredibly reliant on data to maximize their efficiency. For this reason, it will be vital that companies establish trust with their existing customers and new prospects.

Security measures should therefore be top of the agenda for forward-thinking businesses. Companies that fall foul of security breaches and data losses are unlikely to be trusted with consumers’ data going forward, and this could have a detrimental impact on the efficiency of their digital supply chains in the future.

Digitalization is sweeping through the supply chains of companies all over the planet, and its potential is mind boggling. The automation of supply chain processes has already transformed the way supply chains are managed, massively increasing the speed and efficiency of a huge number of different companies.

In the future, we’re likely to see further improvements to digital supply chains, as companies begin to make better use of artificial intelligence and robotics. Look out for supply chains managed by AI-powered software and RPA, and get ready for astounding productivity from early adopters of these exciting new technologies.

Lessons Learned from Intentional Adulteration Vulnerability Assessments (Part II)

By Frank Pisciotta, Spence Lane
No Comments

Food defense is the effort to protect food from intentional acts of adulteration where there is an intent to cause harm. Like counterterrorism laws for many industries, the IA rule, which established a compliance framework for regulated facilities, requires that these facilities prepare a security plan—in this case, a food defense plan—and conduct a vulnerability assessment (VA) to identify significant vulnerabilities that, if exploited, might cause widescale harm to public health, as defined by the FDA. Lessons learned during the conduct of food defense vulnerability and risk assessments and the preparation of the required food defense plan are detailed throughout this three-part series of articles. Part I of this series addressed the importance of a physical security expert, insider threat detection programs, actionable process steps (APS) and varying approaches to a VA. To further assist facilities with reviewing old or conducting new VAs, Part II will touch on access, subject matter experts, mitigation strategies and community drinking water through more lessons learned from assessments conducted for the largest and most complex global food and beverage facilities.

Lesson 6: Utilization of Card Access. The FDA costs of implementing electronic access control, as reported in the Regulatory Impact Analysis document (page 25) are shown in Table 1.

Average Cost Per Covered Facility Initial Recurring Total Annualized
Prohibit after hours key drop deliveries of raw materials $ $1070 $1070
Electronic access controls for employees $1122 $82 $242
Secured storage of finished products $1999 $– $285
Secured storage of raw materials $3571 $– $508
Cameras with video recording in storage rooms $3144 $– $448
Peer monitoring of access to exposed product (not used) $47 $1122 $1129
Physical inspection of cleaned equipment $– $303 $22
Prohibit staff from bringing personal equipment $157 $– $22
Total $9993 $1455 $2878
Table I. Costs of Mitigation

In our opinion, these costs may be underreported by a factor of five or more. A more realistic number for implementing access control at an opening is $5,000 or more depending on whether the wire needs to be run in conduit, which it typically would. While there are wireless devices available, food and beverage organizations should be mindful that the use of wireless devices may in some cases result in the loss of up to 50% of electronic access control benefits. This happens because doors using this approach may not result in monitored-for-alarm conditions, such as when doors are held open too long or are forced open. Some wireless devices may be able to report these conditions, but not always as reliable as hardwired solutions. Using electronic access control without the door position monitoring capability is a mistake. From a cost standpoint, even a wireless access control device would likely be upwards of $2,000 per opening.

Lesson 7: In the interest of time, and in facilities with more complex processes (which increases the work associated with the VA), plan to have quality, food safety and physical security personnel present for the duration of the VA. But also bring in operational specialists to assess each point, step or procedure for the respective operational areas. You may wish to have a quick high-level briefing for each operational group when it’s their turn to deliberate on their portion of the manufacturing operation. Proper planning can get a hybrid style VA done in one-and-a-half to three days maximum for the most complex of operations.

Lesson 8: Conduct a thorough site tour during the assessment process; do not limit your vulnerability activity to a conference room. Both internal and external tours are important in the assessment process by all members of the team. The external tour is needed to evaluate existing measures and identify vulnerabilities by answering questions such as:

  • Is the perimeter maintained?
  • Are cameras pointed correctly?
  • Are doors secure?
  • Are vehicles screened?
  • Are guards and guard tours effective?
  • Internal tours are important to validate documented HACCP points, steps or procedures.A tour also helps to validate process steps that are in multiple parts and may need to be further assessed as a KAT, for public health impact, accessibility and feasibility or to identify issues that have become “invisible” to site employees which might serve a security purpose.
  • Properly conducted tours measure the effectiveness of a variety of potential internal controls such as:
    • Access control
    • Visitor controls
    • Use of identification measures
    • Use of GMP as a security measure (different colors, access to GMP equipment and clean rooms)
    • Effectiveness of buddy systems
    • Employee presence

Lesson 9: Do not forget the use of community drinking water in your processes. This is an easy way to introduce a variety of contaminants either in areas where water is being treated on site (even boiler rooms) or where water may sit in a bulk liquid tank with accessibility through ladders and ports. In our experience, water is listed on about half of the HACCP flow charts we assessed in the VA process.

Lesson 10: Some mitigation strategies may exist but may not be worth taking credit for in your food defense plan. Due to the record keeping requirements being modeled after HACCP, monitoring, corrective action and verification records are required for each mitigation strategy associated with an APS. This can often create more work than it is worth or result in a requirement to create a new form or record. Appropriate mitigation strategies should always be included in your food defense plan, but sometimes it produces diminishing returns if VA facilitators try to get too creative with mitigation strategies. Also, it is usually better to be able to modify an existing process or form than having to create a new one.

Lesson 11: In cases of multi-site assessments, teams at one plant may reach a different conclusion than another plant on whether an identical point, set or procedure is an APS. This is not necessarily a problem, as there may be different inherent conditions from one site to the next. However, we strongly suggest that there be a final overall review from a quality control standpoint to analyze such inconsistencies adjudicate accordingly where there is no basis for varying conclusions.

Lesson 12: If there is no person formally responsible for physical security at your site, you may have a potential gap in a critical subject matter area. Physical security measures will make at least a partial contribution to food defense. Over 30 years, we have seen many organizations deploy electronic access control, video surveillance and lock and key control systems ineffectively, which provides a false sense of security and results in unidentified vulnerability. It is as important to select the right physical security measures to deploy, but also critical to administer them in a manner that meets the intended outcome. Most companies do not have the luxury of a full-time security professional, but someone at the plant needs to be provided with a basic level of competency in physical security to optimize your food defense posture. We have developed several online training modules that can help someone who is new to security on key food defense processes and security system administration.

Lesson 13: As companies move into ongoing implementation and execution of the mitigation strategies, it is important to check that your mitigation strategies are working correctly. You will be required to have a monitoring component, correction action and verification intended for compliance assurance. However, one of the most effective programs we recommend for our clients’ food defense and physical security programs is the penetration test. The penetration test is intended to achieve continuous improvement when the program is regularly challenged. The Safe Quality Food (SQF) Institute may agree with this and now requires facilities that are SQF certified to challenge their food defense plan at least once annually. We believe that frequency should be higher. Simple challenge tests can be conducted in 10 minutes or less and provide substantial insight into whether your mitigation strategies are properly working or whether they represent food defense theater. For instance, if a stranger were sent through the plant, how long would it take for employees to recognize and either challenge or report the condition? Another test might include placing a sanitation chemical in the production area at the wrong time. Would employees recognize, remove and investigate that situation? Challenge tests are easy high impact activities; and regardless of the outcome, can be used to raise awareness and reinforce positive behaviors.

Whether training a new security officer, reviewing existing security plans or preparing for an upcoming vulnerability assessment (due July 26, 2020), these lessons learned from experienced security consultants should help to focus efforts and eliminate unnecessary steps at your facility. The final installment in this series will address broad mitigation strategies, the “Three Element” approach and food defense plan unification. Read the final installment of this series on Lessons Learned from Intentional Adulteration Vulnerability Assessments, Part III.

Mahni Ghorashi, Clear Labs
FST Soapbox

Why the Food Safety Industry Needs the Cloud

By Mahni Ghorashi
2 Comments
Mahni Ghorashi, Clear Labs

Cloud computing and storage, the breakthrough technology that once dominated headlines, conferences and CIOs’ strategic plans, is now commonplace in most industries. That is not to discount the journey it took to get here, though. This easy acceptance wasn’t always the case, and in fact, some of the world’s most important industries are lagging behind.

Food safety is one such industry that stands to gain the most from adopting cloud technology but continues to rely heavily on manual processes, paperwork, and cumbersome on-premise databases. These methods are seen as fail-safe, proven by history to be effective enough and compatible with the overarching goals of the industry. We’re suffering from the age-old adage: If it isn’t broken, we don’t need to fix it.

While the food safety industry has good reasons for taking a more conservative approach to new technology, I’d argue that the most pressing risk to our industry is the failure to invest in innovation. In our own attempts to avoid risk, we’re actually exposing ourselves to far greater losses both in protecting consumers and new opportunities.

A Path Forward For Food Safety

The food safety industry is changing, and changing rapidly. However, despite advances, the industry still faces major challenges. We’ve seen more than 200 recalls just this year. An average recall costs $10 million dollars in direct costs alone. On average, it takes 57 days to recall food, according to a report by the Office of Inspector General.

At the same time, we’re beginning to generate more data than ever, with technologies like blockchain and next-generation sequencing coming online in a big way. We’re about to experience a data explosion arguably bigger than in any other industry. A single NGS test can give industry officials hundreds of millions of data points per analysis, and routine pathogen tests are happening at high volumes around the clock.

This amount of data cannot be contained in the spreadsheets and on-premise databases of today.

The hesitation to adopt cloud-computing is not unfounded, given the initial fear around outages and security, and a disbelief that the technology could ever be as reliable and secure as their existing systems. And the hesitation is even more understandable when you consider that food and beverage is the third-most hacked industry. The damage from these breaches can be extensive, with reports that 70% of hacked food and beverage companies go out of business within a year of an attack. There is a substantial cost for lax security or prolonged outages.

Clearly, any solution has to be comprehensive, and our justifications for switching systems have to be all the more clear. But we cannot as an industry sit idle.

The food safety industry has an opportunity to learn from those who have gone before us and build a stronger, more robust cloud infrastructure.

We’re starting to see this shift take place – some of the top poultry manufacturers have already made the leap into cloud computing. They and others will prove that the value of making the move far outweighs the risk.

Quality Control and Consistency

Right now, it’s not uncommon for food safety employees to record their observations via paper and pencil. In a best-case scenario, these professionals are forced into spreadsheets with limited interoperability. In either scenario, there are huge amounts of friction when it comes to sharing information and, in fact, data can easily be lost as inboxes fill, software crashes, or papers get buried in the shuffle.

By enabling instantaneous data sharing, the cloud makes collaboration across an organization easily accessible for the first time. This, in turn, boosts productivity and also guarantees a higher degree of consistency in both process and results.

Employees can instantly share results, communicate across departments, and easily control permissions and access to information, allowing others to iterate on or apply their findings in real time.

Speed Across an Organization

The drive to increase efficiency actually underwrites the entire food safety industry. Experts are constantly asking how we can be faster at assessing risk, managing recalls, and generally running a business. These questions are only becoming more important as the threat of foodborne illness continues to rise.

The cloud enables greater speed in tracking food information inside and outside of the lab. Perhaps more than any other tool, cloud technology is going to allow the food safety industry to more quickly and effectively manage recalls.

Technology that allows companies to immediately update information company-wide without the burden or drag of an unwieldy IT infrastructure is valuable. Technology that gives you easily interpretable results, so that you can make quick decisions for the good of public health safety is valuable.

Cloud technology enables both. You could easily process terabytes worth of data and spit out easy, comprehensible results that would have otherwise taken days or weeks to produce.

This ability, which on its own is attractive, is especially important as you get into more complicated pathogen tests. For example, with traditional serotyping, a substantial portion of calls are subjective. The speed of cloud computing can take away some of that guesswork.

Dramatic Cost Savings

Not only does the cloud offer a faster system for storing and accessing information, but it also offers cheaper infrastructure, usually an offshoot of its speed. A survey of more than 1,000 IT professionals found that 88% of cloud users pointed to cost savings and 56% agreed that cloud services had helped them boost profits. Additionally, the absolute cost of the cloud is continuing to drop, improving margins.

With the cost savings enabled by the cloud, the food safety lab no longer has to stay a cost center. Adopting cloud technologies can create more wiggle room in a company’s budget and free up resources for ambitious experiments, new product development, and other activities that contribute to the bottom line of the organization.

Security and Regulatory Advancements

The cloud also allows companies to more easily cooperate with HAACP and FSMA regulations. With all of this organizational data easily available and updated in real time, organizations can ensure they’re keeping pace with regulatory requirements by easily producing traceability records and managing compliance requirements across multiple locations and vendors, for example.

While better, more transparent data management company-wide has always been the draw of cloud, the technology has been crippled by simultaneous concerns about security. Food safety executives feel stuck between wanting to comply with best practices and needing to protect sensitive and valuable information.

Fortunately, food safety has waited long enough. Even as recently as 2015, cloud breaches of major organizations’ databases were still making headlines. However, the technology has come a long way in a short time. Cloud providers are beginning to implement automatic checks of systems to analyze threats and identify their severity.

These advancements speak to the food safety industry’s primary pain points, security and speed. By solving for both, the cloud has reached a maturity worthy of the food safety industry.

The Future: Data Pollination

Finally, the cloud makes it much easier to share data across departments, organizations, and even entire industries.

We’re entering an era of data pollination. What I mean by that is there an opportunity to mesh food safety data (genomic data, label information, etc.) with other forms of data—human microbiome data, for instance, to create “personalized” food, enabling consumers to eat ideal foods based on their genetic makeup. While this trend has already taken off, it could be further improved and better validated by bringing food and genetic data out of their silos.

On the opposite end of the production line, data pollination could also help farmers, who have huge amounts of data at their fingertips, understand how they can play a larger role in food safety. If data can enable farmers to produce bigger yields, data can also certainly help farmers prevent any environmental causes of food safety on the farm itself.

Bringing together the data from the entire lifecycle of food—from farmer to consumer—can only be a good thing, powered by the cloud.

Conclusion

The food industry should not look at the task of updating their infrastructure to the cloud as a burden or an extra cost—it’s an investment and when done right, it can provide far greater returns. We have the advantage of late adoption and learning from the implementation mistakes and successes.

This isn’t just incremental improvement territory—we’re talking about making a quantum leap forward in our industry.

Erin Mann, Food Protection and Defense Institute
FST Soapbox

Improving Food Supply Chain Resilience Through Proactive Identification Of Risks

By Erin Mann, MPH
No Comments
Erin Mann, Food Protection and Defense Institute

There was a time not long ago when most of the food Americans ate came from close to home. Consumers primarily ate what was in season and there were less processed and manufactured foods in general. That has all changed. Our world is more accessible, people are traveling more frequently, and as they do, they are also expanding their palates. Consumers can have Thai food for lunch, Ecuadorian for dinner, and enjoy fresh produce year round regardless of the growing season near home. Similar changes in diet and consumption patterns can be observed across the world. This global “shrinking” (globalization) demands longer and more complex food supply chains to move product and provide ingredients.

Attend the Food Safety Supply Chain Conference | June 12–13, 2018 | Rockville, MD | Learn moreTo support changes in consumer demands, food supply chains that support movement of ingredients and products from farm to fork are becoming increasingly global, dynamic and complex. These supply chains are comprised of complicated networks of farms, production or processing facilities, and storage and distribution channels with product moving via road, rail, ship and air across the globe. These supply chains provide the global food and agriculture sector with efficient access to suppliers and consumers around the world. Unfortunately, however, food supply chains are vulnerable to disruptions such as natural disasters, transportation hazards, cyber attacks, product contamination, theft and unexpected shutdowns of key supply chain nodes. Any of these disruptions could lead to significant public health and economic consequences.

Many supply chain risks and vulnerabilities are directly related to the way a supply chain is constructed. First, there are often several degrees of separation between the point of production and the source of raw ingredients with limited visibility of the pathways in between. Spices are an illustrative example of this supply chain challenge. Spice supply chains are notoriously long with product moving through a complex web of farmers, brokers, processors, wholesalers and exporters. By the time a spice reaches a manufacturer for use in a processed food product, the manufacturer may have adequate visibility and information only about the supplier from whom the spice was most immediately purchased. The manufacturer may not have good visibility of supply chain components further upstream. Depending on the nature of the manufacturer’s customers and distribution channels, the same manufacturer may also have limited visibility of downstream supply chain components. This limited visibility up and downstream could be true for every step of the chain. Without end-to-end supply chain visibility, stakeholders cannot adequately assess risks related to supplier quality and reliability. Tracing product forward and backwards becomes a very difficult task. In the event of a supply chain disruption or contamination event, limited supply chain visibility not only impedes mitigation and response efforts, but also exacerbates the event.

Second, supply chains are often constructed in such a way that certain components of the supply chain are more critical than others. For example, a supply chain may rely upon a single manufacturing plant through which all ingredients and all finished product are routed; a shutdown or failure at that point in the supply chain would greatly impact normal operations. Likewise, a supply chain may rely exclusively on a particular transportation route; a disruption to that route from a disaster could significantly delay delivery of product to consumers. A supply chain may also source the majority of a raw ingredient from a single supplier; a disruption to that supplier could force a producer to scramble to identify and vet alternative suppliers.

CRISTAL
CRISTAL (Criticality Spatial Analysis). Photo: Food Protection and Defense Institute

Forward-thinking approaches are needed to address supply chain challenges related to supply chain complexity and poor visibility. While some supply chain risks cannot be avoided entirely, understanding supply chain structure and proactively identifying supply chain hazards based on the structure of the supply chain will ultimately improve supply chain resilience. For example, end-to-end, geo-spatial mapping of the supply chain of a particular product line would allow stakeholders to identify risks such as exclusive reliance upon a single supply chain node. However, such an approach is not easy. End-to-end geo-spatial mapping of a supply chain requires data and information from multiple stakeholders. Sharing information across organizations is both culturally and logistically difficult.

To address these challenges, the Food Protection and Defense Institute (FPDI) has developed technology that allows private food companies and the government to document, visualize and compare supply chains in support of risk and criticality assessments, mitigation efforts and event response. With support from the Department of Homeland Security, FPDI developed CRISTAL or Criticality Spatial Analysis. CRISTAL is a geo-spatial web application that allows organizations to document supply chains from end-to-end, including supply chain components owned by other entities such as suppliers or distributors. Additionally, CRISTAL allows users to visualize the geo-spatial structure of a supply chain alongside hazard layer data, including cargo theft and natural disaster hazards. By increasing supply chain visibility, CRISTAL ultimately facilitates supply chain documentation, product tracing, and event response. Finally, CRISTAL supports efforts to identify where mitigation resources are most needed during potentially catastrophic supply-chain failures.

More information about the CRISTAL technology is available on the FPDI website. Organizations interested in using the technology may contact FPDI at fpdi@umn.edu.

Integrated informatics and food labs

Using Data to Ensure Food Chain Security

By Maria Fontanazza
No Comments
Integrated informatics and food labs
Integrated informatics and food labs
Integrated informatics enable labs to execute and manage all lab processes easily, with the data rigor and intelligence that lab managers require to drive efficiency and profitability, for the lab and for the business. Image courtesy of Thermo Fisher Scientific. (Click to enlarge)

Moving forward, if food manufacturers, suppliers and distributors want to be ahead of the game, they’ll need to have the ability to view their product throughout the supply chain. During a discussion with Food Safety Tech, Trish Meek, director of product strategy at Thermo Fisher Scientific, explains the importance of product traceability in the food chain, from both a consumer and food producer’s perspective.

Food Safety Tech: In your recent article about Integrated Informatics, you cite it as an ideal solution to modernizing a highly distributed food chain. What are the challenges you see companies facing in managing their global supply chain?

Trish Meek: We’ve seen the issues related to intentional adulteration documented throughout the media, and they extend to traceability. For example, what Tesco experienced during the horsemeat scandal wasn’t necessarily intentional adulteration, but rather a matter of not understanding the supply chain. Horsemeat was introduced in France as legitimate meat and then it ended up in the UK. In this case, you have a lack of traceability and thus a lack of understanding of what has happened to your product in its lifecycle.

Trish Meek, Thermo Fisher Scientific
“With consumer demand for foods that are free of gluten, GMOs and antibiotics, it’s becoming more important to customers that they understand everything that has happened to the animal and the food source.” –Trish Meek

In this complex world of suppliers, distributors and food producers, having the ability to pull in analytical data and manage it regardless of the source (whether it’s from the initial ingredient supplier or the final manufacturer) is a critical piece in understanding the overall lifecycle picture. An integrated informatics solution provides a single source of truth for that information: From the technician operating the lab process to the lab manager who is overseeing to the integration into the enterprise-level system. It provides a complete view on everything that has happened to your data, while also enabling the management of regional specifications.

FST: What are the biggest concerns in the area of food chain security?

Meek: Traceability is key, and the common denominator is food chain security: Ensuring that you’re providing security and with an understanding of everything that happened to your product, which leads to quality assurance and brand security.

FST: What are the concerns related to food chain security?

Meek: There are a few concerns:

  1. Adulteration
  2. Correct label claims. For example, 30% of the populous is trying to avoid gluten. While 1% is truly allergic to it, there’s a lot of gluten intolerance. Take, for example, recent commercials from Cheerios saying they are ensuring traceability and can say with confidence that their product no longer comes into contact with wheat in any part of the process. There’s an understanding that consumers want to believe what’s on the label, from both a health and allergy perspective as well as a concern in the public around unhealthy ingredients added or antibiotics used. As a food producer, you want to make sure you can honestly state what has happened to the food and that what you’ve put on your label is true. People are willing to pay a premium, and so there’s a drive towards the premium of being able to claim no GMOs on a label or an organic product.
  3. From a food producer’s point of view, having traceability from all suppliers is key. They want to ensure that any raw materials have been handled and managed with all the same scrutiny and adherence to regulatory requirements as their own processes. With ingredients coming from all over the world, manufacturers are relying on multi-sourcing ingredients from places they don’t necessarily control, so they need to have the traceability before the ingredients appear in the final product.

Using an Integrated Informatics Platform

Trish Meek: Through an integrated informatics platform, users can manage the entire lab process and integrate it into the enterprise system. Having the ability to incorporate the lab data is critical to ensuring product safety, quality and traceability throughout the entire supply chain. Because the solution encompasses lab processes and required lab functionalities, it enables efficiency both in the laboratory as well as across the entire operation. The solution provides an opportunity not just to the top-tier food producers but also the regionally based middle-tier companies that want to set themselves up for future growth.

The reality of the regulations today is that you must look towards the future. Twenty years ago, we weren’t including information about what nuts were present in the labeling. Now there’s consumer awareness and a change in labeling. And five years from now, there could be a different allergy that needs to be documented in the labeling. Integrated informatics gives you the business agility to take on that next step of analysis and adapt to the marketplace.