Tag Archives: vulnerabilities

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Food Fraud With Nasty Results

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis

Global food supply chains are complex and therefore quite vulnerable to errors or fraudulent activity. A company in Chile repackaged and falsely labeled cheap raspberries from China, reselling them as top-level organic Chilean raspberries in Canada. These raspberries were linked to a norovirus outbreak in Canada, sickening hundreds of people. A whistleblower complaint helped to uncover this fraudulent scheme that posed a significant risk to human health.

Raspberry, Decernis
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

Resource

  1. Sherwood, D. (October 6, 2020). “How a Chilean raspberry scam made its way into Canada leading to a norovirus outbreak”. Reuters.
Jennifer van de Ligt, Food Protection and Defense Institute, University of Minnesota

Q&A: Pandemic Puts Worker Health & Safety, Leadership Skills and Business Adaptability at Forefront

By Maria Fontanazza
No Comments
Jennifer van de Ligt, Food Protection and Defense Institute, University of Minnesota

Issues with the health of frontline workers, supply chain disruptions, and changes in consumer behavior are just a few vulnerabilities that the food industry is experiencing as a result of COVID-19. Food Safety Tech recently had a conversation with Jennifer van de Ligt, Ph.D., director of the University of Minnesota Integrated Food Systems Leadership Program and Food Protection and Defense Institute about the hurdles that the industry is experiencing and where we go from here.

Food Safety Tech: What challenges is the food system facing in light of the COVID-19 pandemic? Where are the vulnerabilities?

Jennifer van de Ligt, Ph.D.: The food system is facing primary, secondary and tertiary challenges right now. I see two main drivers as disruptors as a result of COVID-19. The health and safety of employees is the first primary driver. As COVID-19 has more broadly spread through the U.S., ensuring the health and safety of employees in the food system has become essential; however, the pandemic has shown us the food system has struggled with that.

The other big primary challenge facing the food system has been the swift change in consumer behavior. Pre-COVID-19, nearly half of food was consumed away from home. When restaurants closed, and stay-at-home orders were in place, it put extreme amounts of pressure on our food retail segment, causing supply and demand issues.

Regarding the health and safety of employees: We’ve seen meat processing struggle with production demands because the health of their employees has been impacted by the virus. In mid-April, the beef and pork capacity in this country went down by over 40%. They are making great improvements and are approaching normal harvest capacity range for both [beef and pork production]. Meat cuts being produced are slightly different than normal, as this part of the meat plants are very labor intensive. This has really highlighted the need to make sure that we keep the health and safety of our food system employees front and center.

During the 2020 Food Safety Consortium Virtual Conference Series, Jennifer Van de Ligt will participate in a panel discussion on November 5 about Professional Development and Women in Food Safety | Register Now Now that the meat supply chain is beginning to recover, we’re also beginning to see increasing effects on non-meat supply manufacturing. This isn’t isolated to food manufacturing; as we experience broader community spread, COVID-19 will impact all aspects of our food system.

On consumer behavior: As consumers shifted to food retail, immense pressure was quickly put on our food supply chain logistics, manufacturing timing and processes, the speed to warehouses and delivery, etc.

One example that demonstrates a challenge in manufacturing and consumer demand is the difference in volumes for food services versus retail. I like to use the example of shredded cheese. At a grocery store, you’ll find a one-pound pack, but shredded cheese in food service might be in a 10-pound bag. There are not a lot of consumers who want to buy a 10-pound bag of shredded cheese. Well, why can’t cheese manufacturers just package bulk product into one-pound packs? There are several reasons that don’t allow producers to pivot quickly: They may not have the machinery or packaging to do that. Also, changing packaging from food service to retail requires different labels and regulatory approvals. Examples like this led to many of the spot outages consumers found in grocery stores. In the produce sector, it led to produce being plowed under in fields because they didn’t have the distribution channels to go into retail instead of into food service.

In the Integrated Food System Leadership (IFSL) program, we’ve recently discussed food equity and food injustice as a result of COVID-19. As food retail became stressed and unemployment increased, we saw a huge demand for our food assistance networks. Because food retail is one of the primary contributors to the food assistance networks, there wasn’t enough volume being donated. In addition, food service foods are not appropriately packaged to go into the food assistance networks and food banks, similar to the issue in moving to food retail. This led to tremendous pressure and innovative solutions to source and distribute food to a newly vulnerable population.

As we look ahead into the coming months, many of the vulnerabilities in the food system will be the same. We have to continuously monitor the health and safety of our employees to keep our food system as a whole functional. There’s a growing recognition that our primary agriculture workers are also at risk—the people in fields harvesting and planting. There are many groups providing recommendations on how to protect agriculture employees and communities where they work and reside.

We’ll see continued adaptation in the food system to the new reality of how restaurants and food service engage with their consumers with the shift in behavior to limited restaurant dining and increases in online ordering.

FST: In what areas do food manufacturers, processors or growers need to adapt moving forward in order to thrive?

Van de Ligt: There are several. First, I think this crisis has really brought worker health and welfare to the forefront, and there will be more emphasis on the essentiality of food system workers. They were previously a behind-the-scenes workforce. The issue of worker health and welfare is going to accelerate in many industries, but I also see a push to more automation. The human workforce is necessary, and people do a really wonderful job, but are there areas that might benefit from automation? I think those go hand in hand.

I also think the global food system needs to rethink how it remains resilient. In the past, there’s been a focus on resilience and efficiency through economy of scale. That still exists and may look different moving forward. Using the meat industry as an example, that economy of scale was also its biggest weakness that had gone unrecognized. Going forward, I think there are many companies that are going to consider alternative supply chains. Should multiple, smaller plants be utilized instead of one large plant to provide a more resilient framework for production? Other companies are going to think about installing equipment or processing lines that could more quickly pivot between food service and food retail. There’s also a huge opportunity now for local and smaller markets to really make an impact as people look for alternative supply chains and sources. We found that many of the local food markets and co-ops, especially those that provided into food service, pivoted pretty quickly to pop-up online marketplaces to provide food direct to consumer. I think we’ll see that trend increase as well.

In order to feed billions of people worldwide, it’s essential that the food industry take a broader systems approach versus the siloed approach path we’ve been using. The pandemic has highlighted how the food system is an intricately functioning balance and requires collaboration. Our food system will only be able to move forward faster with less disruption when we have food system leaders who understand the intricacies and the ripple effects of the challenges we face. Leaders who understand the impacts of decisions outside of their sphere will be essential to plan for impacts from natural disasters, another pandemic, etc.—and to create a more responsive and resilient food system in the future.

FST: Where does this leave folks who are either beginning or rising in their careers in food safety? Do you think the pandemic has changed food safety careers as they’ve historically functioned?

Van de Ligt: I like to say that ‘what got us here is not going to get us there.’ In general, if you think about where food safety careers have been in the past, the roles have been all about consistency, understanding regulations, making sure we do everything precisely right all of the time so we don’t have a food safety outbreak.

The focus on doing things precisely right all of the time will absolutely continue. What I think will shift is the need for food safety professionals to think more broadly than just the regulations that are required for compliance. Food safety professionals need to understand more about the system that is happening outside their facility; the impact of their work going backwards and forwards in the supply chain.

How things have worked historically in a food safety role has been having a consistent supplier network that provides the same type of product every time; you know what to expect, how to produce and distribute safe food for the customers you serve. In a situation like COVID-19, because of the disruptions from farm to fork, the suppliers you need to work with may be different and you need to quickly make decisions spontaneously as supply shifts. Having the knowledge and skills to navigate changes is essential to ensure the quality and safety of your product.

A highly technical focus that many professionals have when they start their career is often too narrow and won’t be enough for emerging food system leaders. Leadership skills are vital as well. In the IFSL program we teach food system professionals how to explore proactive viewpoints, not just managing people or responsibilities. Managers make sure things are done things correctly; leaders make sure we do the right thing. In order to learn how to do the right thing, we teach skills and tools on how to navigate uncertainty; practicing active listening, constructive feedback; and understanding the concerns of a supplier or customer are examples.

We emphasize and teach in the IFSL program that food system professionals and leaders need to be much more proactive. This means equipping them with the food system knowledge and leadership skills so they can predict and prepare for how decisions affect upstream and downstream. Having a broader viewpoint is critical to adaptivity, which will build resilience and help limit disruption.

Kevin Kenny, Decernis
FST Soapbox

COVID-19 Supply Chain Disruptions on the Horizon

By Kevin Kenny
No Comments
Kevin Kenny, Decernis

On the one level, it’s still too early to see full supply chain stoppages, other than growing port and customs delays. While one does not need a crystal ball to see that significant issues are already on the horizon, it takes time for both positive and negative supply impacts to wend their way through the chain.

My company, Decernis, a FoodChain ID Company, provides a complete regulatory intelligence software suite that covers more than 100,000 global regulations in 219 countries, and as such, we have a unique global perspective on how the pandemic is going to affect the supply chain.

Among the countries to watch is India, which imposed a nationwide 21-day shutdown on March 25 and thus far is the tightest lockdown in the world. In the large cities, the lack of public transportation has forced newly unemployed to walk home, often over a period of days, to their home villages. This creates a challenge for the economy because India depends on seasonal migrant and factory workers.

Unlike most countries, pharmaceutical and supplement manufacturers, as well as food processors, are entirely shut down. While farm operations and their supply chains are exempt, there is no harvest without migrant labor. Moreover, truckers transporting frozen goods often are stopped en route due to uneven permit enforcement across states. Add to this the problem of export foods stuck in containers or ports with limited market access, combined with import/export restrictions, and a crisis is at hand.

And, while the Indian government has not banned rice exports, India’s Rice Exporters Association effectively suspended exports because of dramatic labor shortages and logistical disruptions. So, while buyers exist, there is no practical way to harvest, process or ship those exports.

Combine the lack of migrant agricultural workers with the closing of restaurants and schools in many countries and economies are left with a steep drop in demand. As a result, unprocessed food including pork, eggs, milk and early-harvest fruits and vegetables are being destroyed or “tilled under.”

Countries whose leadership is turning a blind eye to the pandemic (i.e., Brazil) will ultimately see a more significant impact.

Another major player to watch is China, where the tariff crisis initially exposed supply chain vulnerabilities. Combined with the current pandemic, businesses now see that sourcing can often be a more substantial factor than price.

Prior to COVID-19, the United States, among other countries, initiated a trend toward blatant economic nationalism, which significantly accelerated this year. In an effort to protect their populations and national security, countries (i.e., Cambodia, India, Kazakhstan, Russia, Serbia and Ukraine) halted the export of vital commodities. As a result, critical supplies have been diverted to more developed countries that can outbid and pay a higher price, leading to food security risks in smaller and weaker markets.

These factors will trigger a rethinking of supply chains in the medium and long term. The cost savings realized in China, India, Vietnam and Thailand will be weighed against the threats to supply chain stability. The result may be a subtle new form of supply chain nationalism, where companies prefer more reliable local production to lower-cost, more vulnerable foreign production. The recent sourcing trend for large multinationals to partner with fewer, trusted providers could reverse once the dust settles from this pandemic.

The decrease in air cargo capacity (due to the grounding of passenger aircrafts) has also played a significant role in supply chain disruption and will lead to dramatic short-term increases in the cost of air freight.

Last, but certainly not least, will be the fallout from obvious bankruptcies. As an early indicator, 247,000 Chinese companies declared bankruptcy in the first two months of 2020, with many more closures expected.

Obvious candidates include movie theaters, airlines, cruise ships, retailers, and hotels, but any company caught carrying a large debt load is also endangered. Pharma companies and those in oil, gas and petrochemicals will also be affected by a perfect storm of oil market collapse.

On a positive note, any supplement (i.e., Vitamin B, C and D) food commodity (i.e., blueberries, oranges) and processed food products (i.e., juices, yogurts) perceived to have immunity-boosting potential will likely see a short and long-term boost in sales. Botanicals, however, may soon have significant new sourcing problems.

As they deal with consequences of this pandemic, global companies will need to strategize for building a more durable and flexible supply chain. These unprecedented times are sure to spark more innovation and technological growth to address the challenges industry is facing.

Lessons Learned from Intentional Adulteration Vulnerability Assessments (Part III)

By Frank Pisciotta, Spence Lane
No Comments

Food defense is the effort to protect food from intentional acts of adulteration where there is an intent to cause harm. Like counterterrorism laws for many industries, the IA rule, which established a compliance framework for regulated facilities, requires that these facilities prepare a security plan—in this case, a food defense plan—and conduct a vulnerability assessment (VA) to identify significant vulnerabilities that, if exploited, might cause widescale harm to public health, as defined by the FDA. Lessons learned during the conduct of food defense vulnerability and risk assessments and the preparation of the required food defense plan are detailed throughout this three-part series of articles. Part I of this series addressed the importance of a physical security expert, insider threat detection programs, actionable process steps (APS) and varying approaches to a VA. Part II reviewed access, subject matter experts, mitigation strategies and community drinking water. This final article reviews broad mitigation strategies, feasibility assessments, food defense plans, partial ingredient security and the “Three Element” approach through more lessons learned from assessments conducted for the largest and most complex global food and beverage facilities, but which can also be applied to the smaller facilities that are currently in the process of readying for the next deadline of July 26.

Lesson 14: When the final rule was released, the concept of using broad mitigation strategies was eliminated. That notwithstanding and realizing that many companies seek to operate at a stricter standard for food defense with a clear focus on brand protection, versus only those process steps that potentially could result in a “wide scale public health impact.” Broad or facility-wide mitigation strategies should not be abandoned, but are less likely to get you a lot of credit for IA compliance. Including existing food safety prerequisite programs (PRP), programs and practices that are put in place to maintain a sanitary environment and minimize the risk of introducing a food safety hazard, can, in some cases, also be included as security mitigation. PRP’s with slight modifications can also contribute to a good “food defense” posture. For example, one PRP addresses hazardous chemicals and toxic substances. In some cases, non-food grade substances that could result in product contamination (not necessarily wide-scale public health impact) might be available to a disgruntled insider. It is obvious companies are concerned about contaminants being brought into the plants, but please do not overlook contaminants that are already there and ensure that they are properly secured when not in use.

Other facility-wide programs (broad mitigation) that contribute to effective food defense might include site perimeter or building security, visitor and contractor management, pre-employment background checks, employee security awareness and food defense training and sanitation chemical management.

Lesson 15: If you are using the three elements approach (Guidance Chapter 2 Section G) or the hybrid approach (Guidance Chapter 2 Section H), you will be required to make an assessment on feasibility. In the early VA’s conducted, prior to the second installment of the guidance in March of 2019, feasibility was essentially an all or nothing proposition. One could argue that a judgment call was required as to whether an intentional adulteration incident could be accomplished given the inherent conditions. Those conditions might include a lot of coworkers who might be able to observe and serve as witnesses to deter the act. With the release of the second installment of the guidance from the FDA, a new tool was made available which would allow food and beverage companies to run a calculation and make a more accurate prediction of how much of an unnamed “representative contaminant” which is assumed to be highly lethal and heat stable it might take to contaminate a product batch. Typically, the larger the batch size, the higher the quantity of the “representative contaminant” would be required to achieve a lethal dose (LD) in a serving size. So, to provide an additional level of validation with identified actionable process steps, the use of the LD calculation might be considered to provide more realistic insight into the feasibility element. For instance, if it would require one hundred pounds of the “representative contaminant,” you might feel justified in concluding that it is not realistic to get that amount of contaminant into the batch at the process step and rule out the point, step or procedure as an APS. This can save money and ensure limited food defense resources can be channeled to the areas where legitimate risk can be reduced.

Lesson 16: After an APS is identified, sites will need to determine, as the rule states, whether the existing “mitigation strategies can be applied…to significantly minimize or prevent the significant vulnerability.” Simply stated, what is in place today for food safety, and the broad-based security measures in use, may or may not be enough when you consider an insider motivated to contaminate the product. The FDA’s mitigation strategies database may offer some insights into additional food defense measures to consider. Where additional mitigation strategies are identified, from the time of completion of the VA until a site’s regulatory compliance deadline arrives (next one is July 26, 2020), that change must be incorporated into the food defense plan and fully implemented. We recommend that a site make a list of new mitigation strategies after the VA is complete for tracking purposes during the implementation phase. No mitigation strategies should be included in the food defense plan that are not fully implemented and where records cannot be adequately produced.

Lesson 17: In the second installment of the guidance, the concept of partial ingredients was introduced. The key activity types (KAT) of secondary ingredients is now considered to include the storage of partially used, open containers of secondary ingredients where the tamper-evident packaging has been breached. Tamper evident tape looked to have promising benefits, but several of our clients have abandoned the use of this mitigation strategy, which has been proven repeatedly to be defeated without detection. It appears that using containers that can be secured with numbered seals might be a better option and even better if the seals would be metal detectable in the event one went astray in a product stream.

Lesson 18: Food defense plan unification. Facilities regulated under the IA rule are likely to already have a food defense plan for other initiates such as SQF or BRC. The IA Rule is not unlike other counter-terrorism regulations in potential to create challenges to meet voluntary and regulatory requirements without having multiple food defense plans. The IA Rule based on its modeling after HACCP creates some very specific requirements in terms of how data needs to be presented and records maintained. Sites may be doing other things to support food defense, and one strategy that might keep auditors in their lane would be to include any non-IA Rule food defense content (e.g., for SQF or BRC) in an appendix to the IA Rule Food Defense Plan.

Lesson 19: Under the VA method the FDA refers to as “the “Three Element” approach, suggestion is made in the guidance released in March 2019 that regulated facilities might consider creating stratified categories for each element of public health impact, degree of physical access and ability of the attacker to successfully contaminate product. This is asking regulated facilities to engineer their own vulnerability assessment methodology. It is our opinion that this is asking a lot from a food and beverage facility and that creating categories for each element (e.g., refer to Table 3 on page 54) will extend the time it takes to complete a vulnerability assessment, create a lot more uncertainty in the process and does not necessarily help companies to identify the areas where intentional adulteration risk is highest.

Conclusion

Organizations who have yet to execute vulnerability assessments (due July 26) or those who have already completed vulnerability assessments who may wish to reflect back on their existing VAs in an effort to eliminate unnecessary APS’s should find these strategies helpful in focusing limited resources to the areas where they can have the greatest effect. Since the initiation of this article series, the FDA has released its third installment of the guidance. Once we reflect on this new installment, we will address our thoughts in a future article.

FDA

FDA Updates Food Defense Plan Builder to Support Compliance with Intentional Adulteration FSMA Rule

By Food Safety Tech Staff
No Comments
FDA

Attend the Food Defense Plenary Panel Discussion at the 2019 Food Safety Consortium | Tuesday, October 1, 2019Today FDA released an updated version of its Food Defense Plan Builder in efforts to help companies comply with the International Adulteration FSMA rule. Version 2.0 of the tool includes the following sections to help food facility owners and operators in developing a facility-specific food defense plan:

  • Facility Information
  • Process/Product Description
  • Vulnerability Assessment
  • Mitigation Strategies
  • Food Defense Monitoring Procedures
  • Food Defense Corrective Action Procedures
  • Food Defense Verification Procedures
  • Supporting Documents
  • Signature

The tool is for use on a computer, and FDA states that it does not have access to any content or documents used with the tool, nor does it track or monitor how the tool is being used. The agency also emphasizes that use of this tool is not required by law and its use does not mean that a company’s food defense plan is FDA approved or compliant with the IA rule requirements.

The original version of this tool was released in 2013. FDA will be conducting a demonstration of the Food Defense Plan Builder v. 2.0 during a webinar on October 10.

Data protection, security

Threat of Cyberattacks to Food Safety on the Rise

By Food Safety Tech Staff
No Comments
Data protection, security

A new report released by the University of Minnesota’s Food Protection and Defense Institute warns that the food industry is vulnerable to cyberattacks, suggesting that food companies need to beef up their security and IT systems. According to the report, “Adulterating More Than Food: The Cyber Risk to Food Processing and Manufacturing”, the systems that food companies use for processing and manufacturing could be the most vulnerable and as such, serve as an attractive target for an attack—especially as industries that are currently common targets improve their cybersecurity.

“The food industry has not been a target of costly cyberattacks like financial, energy, and health care companies have,” said Stephen Streng, lead author of the FPDI report, in a news release. “However, as companies in those sectors learn to harden their defenses, the attackers will begin looking for easier victims. This report can help food companies learn about what could be coming their way and how to begin protecting themselves.”

The report calls out that in 2011, researchers and manufacturers found more than 200 vulnerabilities in industrial control systems. In addition to the fact that these vulnerabilities are in many components from different vendors, many of these systems have obsolete operating systems and passwords that are easy to hack. Compounding this issue, “Companies often lack knowledge about how their industrial control systems and IT systems interact and lack awareness about cyber risks and threats,” the FPDI release notes.

And if you’re a small company, don’t think you’re immune, the report cautions. It cites that 74% of U.S. food manufacturers have fewer than 20 employees—yet software company Symantec Corp. points out that small companies have been targeted as often, or sometimes even more, than large companies.

How can food companies address this risk? The report recommends the following “critical” steps all companies should take:

  • Bridge the gap and facilitate more communication between OT (operational technology) and IT (information technology) personnel
  • Conduct risk assessments of inventory control systems and IT systems
  • Ensure that staff with the cybersecurity knowledge is involved in procuring and deploying inventory control system devices
  • Incorporate cybersecurity into your food safety and food defense culture.

FPDI’s full report is available on the organization’s website.

Karen Everstine, Decernis
Food Fraud Quick Bites

It’s All About the Supply Chain

By Karen Everstine, Ph.D.
No Comments
Karen Everstine, Decernis

I recently attended two webinars that highlighted distinct perspectives on two challenging aspects of food fraud prevention. First, Chris Elliott from Queen’s University Belfast discussed the current situation with meat fraud. He cited his “top three” fraud-prone foods as meat, olive oil and honey. While we cannot determine the true scope of food fraud globally, looking at the data we have collected from the past 10 years, meat is also in our “top three.”

Commodities, food draud, Decernis
Top 10 Commodity Groups. Source: Decernis Food Fraud Database

Meat is prone to fraud in many ways, including misrepresenting the animal species, fraudulent labeling of production practices (organic, kosher, halal, etc.), the use of unapproved additives, the addition of non-meat-based protein ingredients, and misrepresentation of geographic origin (among others).

Elliott discussed some of the reasons that meat is prone to fraud, which included the fact that the industry is highly competitive, relies on low profit margins, and the supply network can be complex. Discussing specifically the horsemeat scandal in Europe a few years ago, he cited the “mess of subcontracts” involved in the adulterated meat, which were based primarily on price. He finished his presentation by noting that certain aspects of meat authentication are still challenging from an analytical perspective, such as ensuring country of origin and verifying the claims about animal feed consumption.

The final in a series of food fraud webinars sponsored by the IAFP Food Fraud Professional Development Group (PDG) focused on another aspect of food fraud: E-commerce. One of the big challenges with food fraud is the intentional nature of the crime, which can make anticipation of adulterants and fraud methods difficult.

GFSI has stated “any plans and activities to mitigate, prevent or even understand the risks associated with food fraud should consider an entire company’s activities, including some that may not be within the traditional food safety or even HACCP scope, applying methods closer to criminal investigation.” This is particularly true for fraud involving intellectual property (IP) infringement, which adds another layer of complexity to detection and prevention strategies. We have more than 200 records documenting fraud involving “counterfeit” products. Counterfeit products are a problem both because of the IP infringement and because, often, the actual contents of the product cannot be verified. Many of the records we have documented involve counterfeit vodka, whiskey, and wine, as well as non-alcoholic soft drinks.

As part of the IAFP webinar, Axel Hein from ApiraSol discussed their work using global customs data to detect counterfeit products, so-called “fantasy trademarks,” and geographical indication infringements.

Global customs data, food fraud
Slide used with permission from ApiraSol

Many countries provide public access to customs data which, when aggregated and combined with other sources (such as Alibaba transactions), allows mapping of supply chains and detection of unusual patterns that may indicate fraud. In school, I spent many months digging through U.S. customs data trying to uncover patterns that might indicate fraud, so I was very interested to see this being done on a larger scale.

Although each webinar was distinct in its focus, each highlighted the importance of supply chain control and monitoring in mitigating food fraud risk. To paraphrase a point made by Elliott, each arrow in a supply network is a potential vulnerability. The continued globalization of the food supply requires new and innovative ways to reduce these supply chain vulnerabilities.

FDA

FDA Says Routine Intentional Adulteration Inspections Will Start March 2020

By Food Safety Tech Staff
No Comments
FDA

Learn more about food fraud  at the Food Labs Conference | June 2–4, 2020 | Rockville, MDThis week FDA made an announcement during a public meeting that the agency’s routine inspection to verify compliance with the FSMA Intentional Adulteration rule will start next March.

The first compliance date for the rule is this July. It is a requirement for food facilities covered under this rule to develop and implement a food defense plan that identifies vulnerabilities and the consequent mitigation plan.

FDA stated that it has received feedback on the “novel nature” of the rule’s requirements and that stakeholders want more time to develop their food defense plans. “ To allow industry time with the forthcoming materials, tools, and trainings, and because the IA rule represents new regulatory territory for all of us, we will be starting routine IA rule inspections in March 2020,” FDA stated and added that it is working on developing more resources as well as the final part of draft guidance to continue to assist industry.

Bill Bremer is Principal, Food Safety Compliance at Kestrel Management LLC
FST Soapbox

FSMA Checklist: Intentional Adulteration Rule

By Bill Bremer
1 Comment
Bill Bremer is Principal, Food Safety Compliance at Kestrel Management LLC

The FSMA Intentional Adulteration rule is focused on preventing intentional adulteration from acts intended to cause wide-scale food safety impacts to public health, including acts of terrorism, economic adulteration and disgruntled employees. Such acts, while unlikely, could cause illness, death and economic disruption of the food supply absent mitigation strategies. This rule requires mitigation strategies to reduce risk versus specific food hazards.

How much do you know about the Intentional Adulteration Rule? Test your smarts by taking the FSMA IQ Test here The Intentional Adulteration rule is established to address large companies with products that reach many people, while exempting smaller companies. This rule requires covered facilities to conduct a “vulnerability assessment” to identify vulnerabilities and actions to take for each type of food manufactured, processed, packed or held at the food facility. For each point, step, or procedure in the facility’s process, these vulnerabilities must be identified and evaluated. Covered facilities must also prepare and implement a Food Defense Plan. This written plan must identify the vulnerabilities and actionable process steps; mitigation strategies; and procedures for food defense monitoring, corrective actions and verification. A reanalysis is required every three years or when certain criteria are met, including mitigation strategies that are determined to be improperly implemented.

Self-Diagnostic Assessment Tool

The following self-diagnostic assessment tool can help organizations better determine their current state of planning when it comes to implementing and managing FSMA Intentional Adulteration requirements. To complete your own assessment, review and compare your programs to the questions in Table I.

FSMA, Intentional Adulteration
Table I. Kestrel Management’s self-diagnostic tool can help a company assess its Intentional Adulteration program for FSMA compliance.

Get Compliance-Ready

Companies must have the appropriate systems in place to comply with FSMA Intentional Adulteration requirements or face possible willful non-conformance, which can include fines and criminal penalties under FDA enforcement. The questions in Table I will help companies identify areas to consider regarding their program. Kestrel can also help answer questions, provide input on solutions, discuss how to better manage all your food safety requirements, and change “No” responses into “Yes” responses that promote best practices for FSMA and food safety compliance.