Step three in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.

Slides:



Advertisements
Similar presentations
Basic Principles of GMP
Advertisements

Barhale Procedure for Site Establishment
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
FDA’s Proposed Rule under FSMA for Preventive Controls
Are you ready for HIPPO??? Welcome to HIPAA
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
ALERT: The Basics Food and Drug Administration Center for Food Safety and Applied Nutrition.
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
Food Safety and Inspection Service Pathogen Reduction/HACCP.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Step three in developing a food defense plan.  All vendors providing processed foods to USDA federal feeding programs must be in compliance with the.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
Step four in developing a food defense plan.  Having a food defense plan reduces the risk of intentional contamination, but cannot prevent it.  Having.
Step one in developing a food defense plan.  Production Agriculture  Supplies  Transportation  Auctions  Feedlots.
Step two in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Step one in developing a food defense plan.  Production Agriculture  Food Processing  Retail Food Sales.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
A Security Tour of Your Farm or Ranch Farmstead Security:
Good Agricultural Practices (GAP) for Fresh Fruit and Vegetable Growers New England Extension Food Safety Partnership Project funded by USDA CSREES - Agency.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
Quality Control Procedures & Raw Materials Raw materials are the tools, equipment, supplies, goods and services that a company requires to do business.
Creating A Hazard Analysis Based on HACCP Principles Ky Dept of Education School & Community Nutrition Mike Dodridge Steve Justice June 2012.
Actionable Process Steps and Focused Mitigation Strategies
Food Safety Is Risky Business Food Safety Is Risky Business Nancy Flores, Ph.D., Extension Food Technology Specialist Various.
GOOD MANUFACTURING PRACTICES Training about our Food Safety Plan
Hazard Analysis Critical Control Point (HACCP)
Pre-Harvest Considerations
SQF ISO FSSC GMP Programs
CATTLE FARMING By: Logan Evans. Introduction Farming goes back to ancient times where people’s everyday question was, “What are we going to eat today?”.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
/0503 Copyright ©2005 Business and Legal Reports, Inc. BLR’s Safety Training Presentations Hazardous Materials Transportation 49 CFR BLR’s.
Security Issues with Vendors, Employees, and Customers Chapter 10.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Support Programs version 2 March 2010 Cleaning and Sanitation
(Customs & Trade Partnership
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Nutrition Services Update Nancy Rice, M.Ed., RD, LD, SFNS Nutrition Services Director Clayton County Public Schools October 2, 2006.
National Food Service Management Institute The University of Mississippi.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Kentucky Animal Care & Control Association 2014 Annual Training Conference Mock Trial.
Wal-Mart Superstore in San Angelo Texas. Wal-Mart Threat Assessment Vandelism Theft of merchandise Theft of store supplies Illegal entry into facility.
Food Safety, Work Place Safety, and Emergency Preparedness National Food Service Management Institute The University of Mississippi 1.
Doane Pet Care Company Pet Food Safety System (PFSS) M.W. Merkel September 23, 2003 Animal Feed Safety System Public Meeting.
Essential Standard 2.00 Understand the nature of business. 1.
Water Services National Training Group and National Federation of Group Water Schemes 7 th Annual Rural Water Services Conference 18 th September 2008.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Welcome to Developing a Food Safety Program National Food Service Management Institute The University of Mississippi.
Ground Rules Turn off your cell phones and turn on your minds. Ask questions as we cover the content. Sometimes we will use a “parking lot” for the questions.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XI)
Food Security Plans for the Meat Industry Food Security & Recall Plan Development for the Meat Industry March 6, 2010 Myrtle Beach, SC Lynn Knipe The Ohio.
© 2011 Michigan State University and United Nations Industrial Development Organization, original at CC-BY-SA Food Defense.
Module 5: Designing Physical Security for Network Resources
Author: Nurul Azyyati Sabri
Farm BIosecurity.
Facility Manager IPM PLAN and Policy
Field Inventory Services-Sanofi Inventory and Audit Training
A Road Map to Food Safety
SQF ISO FSSC GMP Programs
Transportation Security
Facility Manager IPM PLAN and Policy
Presentation transcript:

Step three in developing a food defense plan

 In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.  They were attempting to influence an election.  751 individuals became ill, and  45 of those were hospitalized.

 Defense plans are encouraged but not required for food establishments. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists,

 All vendors providing processed foods to USDA federal feeding programs must be in compliance with the Food Defense System.

 Vulnerability assessment  Map of Facility  Operational documents  HACCP plan  SOP or GMP  BQA or PQA plans

 Designate a food defense coordinator to develop, implement and maintain the Food Defense Plan

 Describe each vulnerability specifically.  Decide if the vulnerability is practical to address.  Determine a countermeasure.

 Decide who will be responsible to implement the countermeasure.  Choose a reasonable timeline for implementation.  Initial plan when implementation of countermeasure is completed.

 Install countermeasures  Workforce implementation  F – follow company food defense plan and procedures  I – inspect your work area and surrounding  R – recognize anything out of the ordinary  S – secure all ingredients, supplies and finished product  T – tell management if you notice anything unusual or suspicious

 Review and revise the plan to accommodate new and newly elevated risks  Train the employees regarding their effort in:  Prevention  Detection  Response

 Test the countermeasures after implementation  Make unannounced entrances at various checkpoints  Check locks in vulnerable areas  Perform a mock recall  Test inventory procedures

 Re-evaluate the plan annually or as products, processes or facilities change.  Copies of the plan should be kept on-site and off-site.

 Family owned pasture based cow-calf and grass finishing operation.  Livestock on farm  100 fall-calving cows and their calves  25 replacement heifers  20 steers being grass finished  Located 8 miles outside of town on a county highway.

 Farm is 440 acres  Two pole barns, one three-sided structure  Perimeter has woven wire fence and two strands of barbed wire with no gate on driveway.

Q#Specific Vulnerability Practical Y/N Countermeasures Who will Implement Timeline to Implementation Date Completed Initials 1 Driveway has no gateyes Add a gate at driveway entrance Murray, Brangus and Angus MGM 1 No exterior camerasno 1 No signage on perimeter fence yes Add “no trespassing” and “no hunting” signs to fence Murray, Brangus and Angus AM 1 Perimeter fencing is not monitored regularly yes Implement a schedule for monitoring fence line monthly Brangus and Angus BM 2 Door for pharmaceutical and chemical storage not locked yes Add lock to door and limit number of keys issued (family members only) Murray MGM 3 Procedures for feeding, doctoring, processing cattle are not secure no 3 Visitor logyesImplement a visitor log systemMurray MGM 4 Liability for cattle not in shipping and sellers agreement yes Negotiate the agreement so liability for calves sold at auction is with hauler and then auction facility Murray MGM 5 No inventory system for feed chemicals or pharmaceuticals yesDevelop and inventory systemMurray MGM 6 Well head is not lockedyesLock well headMurray MGM 6 Well head is not lockedyes 8 No security training for family yes Familiarize family with SCAN and other security training Murray MGM 9 Fences between farms don’t limit access to livestock no 9 Feed is not stored in a lockable facility no