Food Defense Plan Builder

Slides:



Advertisements
Similar presentations
AIMSweb Benchmark Online Training For AIMSweb Teacher Users
Advertisements

Work Orders Throughout this slide show there will be hyperlinks (highlighted in blue). Follow the hyperlinks to navigate to the specified Topic or Figure.
HELPFUL HINTS FOR USING AND ADJUSTING PRICE LISTS 1.How to save a price list to your computer 2.How to print a price list (an.xls file) 3.How to print.
Whats New in Office 2010?. Major Changes in Office 2010 The Office Ribbon, which first made its appearance in Office 2007, now appears in all Office 2010.
CompassLearning Odyssey. What is Odyssey? CompassLearning Odyssey is a research-based curriculum. CompassLearning Odyssey is a research-based curriculum.
AIMSweb Progress Monitor Online User Training
 Use the Left and Right arrow keys or the Page Up and Page Down keys to move between the pages. You can also click on the pages to move forward.  To.
EXCEED® IEP Quick Start Card – Student Record/Events 1.Select the left vertical bar to close the student panel, giving more space for the student record.
Orchard Harvest™ LIS Review Results Training
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
1 © 2006 by Smiths Group: Proprietary Data Smiths Group Online Performance Review Tool Training.
6 th Annual Focus Users’ Conference Teacher Lesson Plans Presented by: Kori Watkins.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
IWebFolio Using a Template Tutorial Images in this tutorial:
Actionable Process Steps and Focused Mitigation Strategies
Adobe Forms THE FORM ELEMENT PANEL. Creating a form using the Adobe FormsCentral is a quick and easy way to distribute a variety of forms including surveys.
Cutting-and-Pasting Content Directly Into Blackboard.
Our Focus is YOU! Getting Started with Resume Generator Plus If you are a first time Resume Generator Plus user: you will begin by going to the Employment.
Created by: Ian Osborn. Possibilities Of Movie Maker Windows Movie Maker allows users to organize and add effects to media clips that ordinarily would.
MSDSonline HQ: Viewer Site Tour Main Menu Getting to your Company List Searching within your Company List How to View and Print an MSDS How to Print a.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
Indistar® Leadership Team Meetings. Where can we plan a meeting? From the Navigation Toolbar, simply click on ‘Team Agendas & Meetings’
Welcome to the University of West Florida Online Employment System Applicant Tutorial.
Copyright © Texas Education Agency, All rights reserved. 1 Web Technologies Website Development with Dreamweaver.
 First time student activates their google account, they need to go to an internet browser and go to  drive.google.com/a/students.macon.k12.nc.usdrive.google.com/a/students.macon.k12.nc.us.
A Guide to the BIZNET Online Filing System STATE OF CONNECTICUT DEPARTMENT OF CHILDREN & FAMILIES (DCF) DEPARTMENT OF DEVELOPMENTAL SERVICES (DDS) DEPARTMENT.
Web Technologies Website Development Trade & Industrial Education
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Curriculum Guides Presented by: Kori Watkins Presented by: Kori Watkins.
The ePortfolio and Student Evaluation A training presentation by: Amy Cannady Robin Drewry Bonnie Hicks.
Using the Georgia Online Assessment System(OAS) We will lead the nation in improving student achievement. Kathy Cox, State Superintendent of Schools.
Using the FOCUS Web Site Teacher’s Desk. Topics Covered in this Presentation n Accessing the FOCUS Web site n Importing and Creating Classes n Adding.
Nancy Severe-Barnett Program Coordinator, SCIS
Technology Planning & ePeGS David W. Dillard David W. Dillard Arcadia Valley R-II.
Website Development with Dreamweaver
Online Training for TEXAS TECH UNIVERSITY and TEXAS TECH HSC Hiring Managers Employment Office April 2003.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
Fall 2005 Using FrontPage to Enhance Blackboard - Darek Sady1 Using FrontPage to Enhance Blackboard 1.Introduction 2.Starting FrontPage 3.Creating Documents.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Discipline Referrals Presented by: Christine Lee Presented by: Christine Lee.
1. Chapter 25 Protecting and Preparing Documents.
Wiki Training: Introduction to Instructor: Zach Silveira (415)
Training Guide for Inzalo SOP Users. This guide has been prepared to demonstrate the use of the Inzalo Intranet based SOP applications. The scope of this.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
Rev.04/2015© 2015 PLEASE NOTE: The Application Review Module (ARM) is a system that is designed as a shared service and is maintained by the Grants Centers.
 To begin you first need to sign up to Weebly by going to or alternatively and we will create an account.
Online Catalog Tutorial. Introduction Welcome to the Online Catalog Tutorial. This is the place to find answers to all of your online shopping questions.
Career Cruising Resume Builder. Resume Builder The Resume Builder can be found on the Career Cruising home screen upon logging in. The tab is located.
Creating A Survey Using Office of Student Affairs Assessment The University of Georgia A-Team Training-Skills Session 1 October 30, 2007.
2004/051 >> Supply Chain Solutions That Deliver Users.
Page 1 Orchard Harvest ™ LIS Training Order Patient Samples.
Creating a Google Site For a Digital Portfolio Purpose.
Excel Tutorial 8 Developing an Excel Application
Getting Started with Application Software
Annual Performance Management Cycle Management Training Tutorial
A Step by Step Tutorial This PowerPoint presentation is intended to show eDMR users how to login and use the eDMR system.
About SharePoint Server 2007 My Sites
Administrator Training
Welcome to.
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
Let’s Respond Toolkit Website Introduction
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Kristan Williams Soave HR Dept
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
How to manage approvals in Chrome River
Presentation transcript:

Food Defense Plan Builder

Food Defense Plan Builder Software and program for the Plan Builder is found on the FDA website: http://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm349888.htm Click on the Food Defense Plan builder tab in the left side toolbar, then click the “Download” link in the center of the page. Complete the information page on the web site and download the Food Defense Plan Builder software.

Food Defense Plan Builder Start-Up Page Select “New” to start a new Food Defense Plan Help button describes all categories within the plan builder

Company Information Page FDA # here and add Date OPCO registered (DLATS Req) Enter all pertinent data

Broad Mitigation Strategies Answer questions using N/A, Currently Doing, or Gap. Write applicable comments. If Sample Plan Content narrative applies, click “Apply to Plan”. If it does not apply in whole or part, edit data as seen on next slide.

Editing Plan Content Data To edit, click “Tools”, then Check “Edit Broad Mitigation Strategies” Right click the question on left and click “edit question”

Edit Plan Content Data All category boxes may be edited to make the response site specific. Edit the Sample Plan content to indicate what actions or conditions exist at your specific site. This cannot be a one size fits all response.

Editing Content When not all criteria is met, use the “Gap” category to document the deficiency and the action plan. The action plan will populate under the “Action Plan” tab toward the end Plan content was modified from the original response

Vulnerability Assessment

Vulnerability Assessment Process of identifying and prioritizing the weaknesses in a food operation Helps Identify: Actionable Process Steps Areas of an operation where Focused Mitigation Strategies should be applied We will discuss Focused Mitigation Strategies during the next Exercise (Exercise C)

Accessibility Measure of the ease with which an attacker can physically access the intended target to intentionally contaminate the food Add question to slide A target is accessible when an attacker can reach it to conduct the attack and leave undetected Accessible = openness of the target to the threat

Accessibility Scale (Can I get to the target?) CRITERIA SCALE Easily Accessible (e.g., target is outside building and no perimeter fence). 9 – 10 Accessible (e.g., target is inside building, but in unsecured part of facility). 7 – 8 Partially Accessible (e.g. inside building, but in a relatively unsecured, but busy, part of facility). 5 – 6 Hardly Accessible (e.g., inside building in a secured part of facility). 3 – 4 Not Accessible (e.g., there are physical barriers, alarms, and human observation to prevent reaching the target). 1 – 2 You will then judge each operation on the flowchart using (3) scoring scales. The first is for “Accessibility,” can I get to the target. This scale primarily looks at the physical measures that might make it difficult to reach a target. Keep in mind that the accessibility can be different for different people. An employee – even a disgruntled employee – will have more access than an outsider. So you could perform this exercise and get different scores depending on who the “bad guy” is. For today’s exercise we will presume the attacker is a fairly new employee working in a non-processing area like the warehouse. 12

Vulnerability Measure of the ease with which a contaminant can be introduced in quantities sufficient to achieve the attacker’s purpose (once the target has been accessed)

Vulnerability Determined by the characteristics of the target Volume appropriate to accommodate contaminant Sufficient and uniform mixing after addition Ability to work unobserved, e.g, poor supervision Time available for introduction of agents Downstream processing will not eliminate the contaminant What mitigation strategies are already in place?

Vulnerability Scale (Once I get to the target, can I contaminate the product?) CRITERIA SCALE Highly Vulnerable (e.g., product is openly exposed and there is lots of time to allow for easy introduction of contaminants without being seen). 9 – 10 Vulnerable (e.g., product has some open exposure and there is sufficient time to almost always allow for introduction of contaminants without being seen). 7 – 8 Somewhat Vulnerable (e.g., product has limited exposure points and limited times when contaminant can be added without being seen). 5 – 6 Barely Vulnerable (e.g., product has limited exposure points but is almost always under observation while in production). 3 – 4 Not Vulnerable (e.g., product is in sealed vessels/pipes with no practical exposure points or it is under full and controlled observation). 1 – 2 The second scoring criteria is “Vulnerability.” This presumes the attacker has reached the specific operation somehow, whether that was easy or difficult. Now that the attacker has reached the operation, how easy is it to make a contamination – and to do it without being caught. Common factors that impact vulnerability is how open or closed the system is, and how well the area is kept under observation to detect any unusual activity. (If you think it is appropriate to the audience you can point out that there are some extreme cases that make an operation less vulnerable depending on dilution and dose – for example a large water reservoir, while easy to contaminate, is NOT EASY to contaminate with a sufficient quantity of most agents to cause harm. And a minor ingredient, that is used in very small quantities, may need to be almost entirely replaced to cause harm.) 15

Vulnerability Assessment Click the + sign to create the first process name

Vulnerability Assessment Begin assessment by identifying all processes that impact food defense. Identify major process categories and the steps within that process. These are areas where food products may be accessible and vulnerable to intentional tampering After clicking the + sign, this box appears. Enter your process title Due to a glitch in the software, you must check the yellow “+” sign when entering a process name or it will not save

Listing a Process and Process Steps Process: Product Delivery (example) Process Steps Product leaves OPCO in trailer Product delivered to customer (partial product removal from trailer with remainder of product left onboard) Product driven between customer locations Undelivered product returned to OPCO

Process Step Scoring Utilizing two portions of the CARVER assessment tool (Accessibility and Vulnerability), you will assign a rating describing how accessible the food product is for someone to tamper with it in the step you have described. This includes outsiders and employees. A product may be very accessible to many employees, but may not be vulnerable due to various protective measures taken. (example – numerous employees can physically get to the product but due to supervisory over-watch, CCTV systems, no personal bags allowed, etc., there is a low vulnerability of being contaminated).

Accessibility

Vulnerability

Assigned Risk Score for Process Step Each step in the process will have a risk score. Any step identified as actionable will have an action plan associated with it to reduce that risk

Vulnerability Assessment Process Examples

Focused Mitigation Strategies Targeted efforts implemented at a process step to minimize or prevent intentional contamination Vulnerability A  Mitigation A Vulnerability B  Mitigation B

Mitigation Strategies Mitigation Strategies Examples Broad Mitigation Strategies Focused Mitigation Strategies Require visitors be escorted Ensure adequate lighting throughout facility Conduct background checks Restrict personal items in production areas Install locks on all liquid storage tanks Require peer monitoring in sensitive areas Inspect ingredient staging bins prior to use Employ automated ingredient addition technology

Focused Mitigation Strategies Each step identified as actionable will populate on the Focused Mitigation Strategies tab. Click cursor under mitigation strategies and type in a strategy you have in place to reduce the accessibility and vulnerability risks to your products. If no mitigation strategies can be developed or thought of, click on the “Search” tab on the right side (must have internet access). This will take you to the FDA sight where you can do a search for the topic in question and receive a list of pre-formatted mitigation strategies considered “industry best practices”. Simply select from the list and it will populate onto your screen.

Examples of FDA Listed Focused Mitigation Strategies

Emergency Contacts Use “+” sign to add additional emergency contacts

Action Plan Any Step identified as Actionable that had mitigation strategies entered, will populate on the Action Plan page. Additional steps and comments may be added, as well as dates for start and completion

Completed Food Defense Plan Plan is created from data entered on previous screens. Any item with an action plan is so noted When file is saved, it will save in the Plan Builder program and must be opened in that program.

Saving Files To export file as a Word Doc, Excel, or PDF, click on the disc icon at the top and select format to be exported in.

At any tab in the plan builder, the files can be exported in pdf, word or excel, as individual sections or as a complete document. The Food Defense Plan tab is the only section that has the “export” icon in the toolbar allowing you to export the entire document without having to go through the “File” menu. If you have a need to export a single portion, such as, just the action plan, or mitigation strategies, use the “File” tab, scroll down to “Export” and all of the individual categories will populate. Select the one you desire and click it. That portion will appear. Click on the “Export” disc icon to export it in the format you need.

Supporting Documents Any supporting documents you wish to attach to the Food Defense Plan may be included using the Supporting Documents tab. Click on the yellow + tab and add a document. Insert documents: “Continuous Improvement Commitment” and “Management Commitment Letter” (DLATS requirement )