Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

Barhale Procedure for Site Establishment
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
Step three in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
9 - 1 Computer-Based Information Systems Control.
Chapter 5 Enhancing Security Through Physical Controls
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Step three in developing a food defense plan.  All vendors providing processed foods to USDA federal feeding programs must be in compliance with the.
Step four in developing a food defense plan.  Having a food defense plan reduces the risk of intentional contamination, but cannot prevent it.  Having.
Step one in developing a food defense plan.  Production Agriculture  Supplies  Transportation  Auctions  Feedlots.
Step two in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Step one in developing a food defense plan.  Production Agriculture  Food Processing  Retail Food Sales.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
A Security Tour of Your Farm or Ranch Farmstead Security:
Foreign Animal Disease Angie Dement Extension Associate for Veterinary Medicine Texas AgriLife Extension Service College of Veterinary Medicine and Biomedical.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
1. 1.Define Systems Approach 2.List selection criteria for selecting at- risk neighborhoods. 3.Define neighborhood boundaries. 4.List assessment team.
TM Foundations of Real Estate Management BOMA International Module 5: Putting it All Together Security ® ®
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
High-Rise Life Safety for
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Wastewater Infrastructure Security Workshop April 15, 2002 Denver, Colorado.
How to implement In Port Facility
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
(Customs & Trade Partnership
SECURING THE SUPPLY CHAIN KENNETH R. WYKLE PRESIDENT, NATIONAL DEFENSE TRANSPORTATION ASSOCIATION Ph:
SPECIAL SERVICES and McBRIDE & SON CONTRACTING BUILDER’S BLOC Present SECURITY AWARENESS.
Chapter 6 Enhancing Security Through Procedural Controls.
Physical (Environmental) Security
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
LESSON 11 PHYSICAL SECURITY Prepared by: Camo, Christian Leo O. BS Criminology LEA 2.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Food Safety, Work Place Safety, and Emergency Preparedness National Food Service Management Institute The University of Mississippi 1.
Biosecurity Training Module 3
Keep your neighborhood safe. Where do you live? a house an apartment a condominium.
Food Defense Plan Builder
Biosecurity for the Livestock Enterprise. Biosecurity – Disease Prevention Management practices to protect health of livestock herd –Prevent introduction.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
Circulation, Control, Safety, and Security 12 chapter.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Food Safety and Sanitation Problem Identification FFA Food Science and Technology CDE 2002.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Food Security Plans for the Meat Industry Food Security & Recall Plan Development for the Meat Industry March 6, 2010 Myrtle Beach, SC Lynn Knipe The Ohio.
© 2011 Michigan State University and United Nations Industrial Development Organization, original at CC-BY-SA Food Defense.
Chapter 9 Security and Safety. I. Security: An Overview A. SECURITY DEFINED B. SECURITY OBLIGATIONS 1. Foreseeable Harm A landlord’s duty to take security.
Module 5: Designing Physical Security for Network Resources
Physical and Technological Security
Farm BIosecurity.
Overview For this section, a series of slides will be shown.
Pest Management.
Overview For this section, a series of slides will be shown.
Facilities Management & Logistics
FAD Are We Ready? Bill Mies July 9,2006.
Objectives Telecommunications and Network Physical and Personnel
Safeguarding and Protecting individuals from abuse
Managing the IT Function
FOOD DEFENSE TRAINING Brigiotta’s Farmland Produce & Garden Center, Inc.
SECURITY TRAINING AND THREAT AWARENESS
Part 1 Security Action Plan Template.
Presentation transcript:

Step two in developing a food defense plan

 Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs and sheep  Controlled by fall 2001, restrictions on livestock movement until 2002

 2,030 cases, 6 million animals culled  Losses of $11.7 billion  Delayed an election

 Countermeasures are actions taken to reduce the risk of intentional contamination in vulnerable areas.

 Procedures  Facility  Technology  Personnel

 Protect:  Personnel  Product  Property

 Lights  Dusk to Dawn lighting available through most electric coops  Motion sensor lighting  Visibility  Neighborhood Watch  Vegetation trimmed for visibility  Driveway alarm

 Lock Gates  Lock Buildings  Doors  Windows  Lock Well Head  Lock Supply Areas  Feed bins  Vet supplies  Chemicals

 Fences  Road Frontage  Limit gates  Signage  Buildings  Entrances  Visitor Log

 Public – Restrict entry to facility, check identification, visitors sign log, supervise visitors

 Principles: Check and Challenge  Livestock Sales  Check the contract and negotiate liability

 Product Sales  Check security with market management  Challenge ▪ Add layers to packaging ▪ Tamper resistant packaging

 Incoming supplies, delivery procedures, storage, shipping of products, mail procedures, computer access etc.

 Pre-employment screening, employee supervision, scheduling, identification, access, security training

 See  Challenge  Ask  Notify