Sunday, April 29, 2018

Food Defense - IV


Food Defense and Food Safety
In the context of food safety and food defense, both systems drive the efficiency of food sustainability efforts; they are the means to align consumer requirements for safe food with confidence for consumption. Food security concentrates on sustainable supply and distribution of food products and how does that affect the actions of a farmer, or food distributor or manufacturer, or food service outlet as well as how does it impact the food system? Food security guides the efficiency and effectiveness of food safety, which in return strengthens food security. The food defense and food safety informs the practical ways of inspiring confidence in the foods consumed, while lowering or eliminating foodborne illness. There is close interplay between the physical aspects of producing food and the financial realities of business. Nonetheless, there are political and cultural (even religious) realities of food production and consumption, along with the impact that producing food has on the environment. Most importantly, there are the very genuine personal physiological and psychological impacts on food that are consumed.

Hence, development of food defense program will be more effective and efficient with a food safety program. As such, following food defense procedure has developed to upgrade an existing food safety system with few additional documents while adapting to existing protocols with amendments wherever necessary. The given program is a generic example, which is not very comprehensive where individual plants can adjust according to their requirements where necessary. The procedure was developed for the educational proposes where customization are mandatory if any person wants to use it as a company own procedure.      




FOOD DEFENSE PROCEDURE
Standard Operating Procedure for Food Defense Program





Distribution:

1.         Chairman
2.         General Manager
3.         Quality Assurance Manager
4.         Factory Manager – XYZ Factory
5.         Production Manager – QUV Factory
6.         Sales Manager
7.         Purchasing Manager
8.         Security Officer
9.         Administration Officer  

1.0       Objective
To quickly and accurately identify, respond to, and contain threats or acts of intentional contamination are strictly controlled through planned arrangements, requirements with the existing food safety management system, and is being effectively implemented and updated continuously.

2.0       Scope
This procedure covers all the security measures applied including, risk assessments, annual evaluations, employee screening, access control and inspection related to food defense and food safety.

3.0       Responsibilities
            Overall                                                           – General Manager
            Direct                                                             – Factory Manager
            Security requirements                                 – Security Officer/Consultant 
            Maintain data collection                             – Factory Manager
            Maintain food defense system                   – Quality Assurance Manager
            Maintaining/Updating/Documenting    – Food defense team/food safety team
            Preparation of relevant documents         

4.0       Activities

4.1       General   
4.1.1   The XYZ Pvt. Ltd., who manufacture, process and pack orthodox black tea shall have following food defense procedure to deter and prevent intentional contamination and will have protocols in place to quickly and accurately identify, respond to, and contain threats or acts of intentional contamination. Nonetheless, company registered green leaf collectors and individual suppliers will ensure their suppliers adopted to given protocols and implement appropriate controls which will be audited annually.
  
4.1.2    The laws and legislation requirements governing food defense vary from country to country. Hence, company has defined a minimum set of food defense standards to help company meets legal and consumer expectations, where selected standards may exceed the requirements of a specific country or area.

4.1.3    The management has selected food safety team as the plant food defense team where additional consultants on the specific requirement will be hired from the outside.

4.1.4    The food defense plan shall be developed along with the food safety plan, covering areas which are not covered during the hazard analysis in-line with intentional adulterations on the company’s products.

4.1.5   The company’s written food defense plan includes vulnerability assessment, including required explanations, to identify significant vulnerabilities and actionable process steps. The process has defined mitigation strategies, including required explanations for food defense monitoring procedures and corrective actions verification plans for the complete assessment of food defense program.

4.1.6 Statutory and regulatory authorities and other organizations including clients/ distributors/supermarket chains that may have an interest or impact on food defense shall be informed as appropriate on issues concerning them. Such communication shall be done by or under the approval of General Manager.

4.1.7   Any inquiries, customer feedback or any other information from supermarket chains, including customers, suppliers and statutory and regulatory authorities regarding food defense shall be communicated to Quality Assurance Manager. Customer complaints and related activities on food defense also shall be communicated to Quality Assurance Manager. All above information and issues shall be documented and communicated.
  
4.1.8    The food defense team has selected mitigation strategies for actionable process steps, which identify and implement mitigation strategies at each actionable process step to significantly minimize vulnerabilities, including a written explanation of how the strategy can minimize the vulnerability.

4.1.9    Food defense monitoring plan shall monitor the mitigation strategies with adequate frequency to provide assurances that they are consistently performed. Verify that mitigation strategies are properly implemented and appropriate decisions about food defense corrective actions are being made, and implemented while conducting validation of the food defense plan as appropriate.


4.2       Gap Analysis/Self-assessment
4.2.1  A gap analysis/self-assessment shall be conducted prior to new food defense program, and every year there will be an annual review to the existing system to identify gaps, new treats, adaptability, suitability and continuity. Thus, company can maintain its food defense program by actually fixing gaps identified in assessments and modifying the plans and programs as conditions change. The key activities are;
a)Identify the most vulnerable components of the site’s operations and, determine how to use resources, procedures and protocols most effectively to reduce risks;

b)Identify potential areas of exposure, or “gaps” in the site’s security measures; and,

c)Once the gaps are identified, countermeasures (such as program or process improvements or physical security hardware upgrades) can be used to bridge or fix the gaps.

4.2.2    The system shall be audited under the ongoing internal audit plans based on this procedure, however company will hire an external food defense auditor bi-annually with internal audit team to make sure system is runs at its optimum conditions. The internal audits shall focus on the plans and procedures developed while assessing the site’s implementation of the plan which will show any gaps that need to be fixed.

4.2.3    The food defense system of the company shall be adapted to the PAS 96: 2014 as the main food defense standard that will be used to develop company’s food defense plan and will use the PAS 96’s Risk Assessment methods to evaluate its food defense system requirements together with Hazard Analysis of ISO 22000 FSMS.

4.2.4    The company has developed a comprehensive risk assessment checklist for the evaluation of risks together with PSA 96:2014.

4.2.5   Company has established employee hiring manual, which includes a minimum level of background checks for all the employees.   

4.3       Access Control and Visitor Management
4.3.1    Effective access control is the foundation of a successful food defense plan where company has implemented an automated access control system for the office areas and production with identification colours for each sections, ID cards for employees with their credentials and limited access visitor passes.


4.3.2    Security shall identify and document all individuals gaining access to the facility, limit access to those who have a legitimate reason to be there, control pedestrian and vehicle traffic at the site and properly report and respond to incidents challenging this policy.

4.3.3    The visitors and general employees shall be controlled for gaining access to processing and manufacturing, raw material, ingredient, packaging storage areas, hazardous and chemical storage areas as well as shipping and receiving areas. The access to these areas are limited to the individuals who require access in order to complete their assigned tasks and their uniforms are specifically colour coded relevant to the working area.

4.3.4    The vehicles coming in and out going of the facility shall be inspected, recorded and verified before gaining access or leaving whether they are belong to the company, employees, visitors or suppliers. The parked vehicles shall display a placard or decal issued by the facility.

4.3.5    The visitors are advised to check in and check out when entering and leavening the facility. A visitor log book is maintained and security will scrutinize any visitor before entering the facility and connected to the specific person in charge of the visit.


4.3.6    The visitors are screened and verify the visitation before granting the access to the facility as well as areas where visitor will have specific access to.

4.3.7    The visitors are accepted though general office and accompanied by a company executive during entire visit. The visitor is not left alone for any circumstances other than use of washroom or inside the visitor’s resting area.

4.3.8    The company shall provide passes for all the registered suppliers while security has been advised to scrutinize suppliers entering to the facility with specific persons registered.

4.3.9    If allergens are handled by the facility for any specific activity, they shall be segregated from the products or raw materials to avoid any cross contamination.

4.4       Secure Facility Controls
4.4.1    All the perimeter areas are demarcated, high fenced, with specific in and out gates which are strictly controlled by the security personnel and surveillance camera (CCTV) system. Fencing, surveillance cameras and security personnel shall be deployed as to the requirements and risks identified.


4.4.2    The facility shall be kept enclosed all the times, the entrance gates are controlled through a security personnel.

4.4.3    All the buildings or facilities shall be under lock and key when they are not in use. Storages, vehicles, containers, trailers or any other temporary holding units which are not being used are kept locked.

4.4.4    Secure all the agricultural chemicals and verify inventory on a schedule basis with restricted access keys.

4.4.5    All the specific keys to the doors shall be kept strictly controlled, there is a specific key registry which identifies the specific key holders for each access door in the facility. The areas specifically restricted for general employees, visitors, and untrained employees will be demarcated, informed and sign boards are posted. If any employee given a specific access to a restricted area where is not his/her duty station, they have to record, sign and receive the specific access keys which will be strictly regulated and controlled on the basis of case by case.

4.4.6    When the employees are terminated or resigned uniforms, name tags, identification badges shall be collected from them prior termination/resignation.

4.4.7    The company mails are collected at the security point, verified, recorded and delivered to the office; the mails are distributed through administration officer, asking individually collect it from the office.


4.4.8    Personnel items are not allowed out of the rest room, all the belongings of employees are kept away from the production and storage areas.

4.4.9    Computer and network access shall be granted to the specific personal according to their job functions once it is a necessity, other personnel are restricted to the access.

4.4.10  All the transactions are recorded and the company has established a traceability system, which includes computer based transactions and all the manual transactions.
4.4.11  The security personnel are advised to conduct routine security inspections of the premises for signs of tampering, criminal or terrorist activities or any noticeable incidents.


4.4.12  Security has been instructed to verify security of doors and windows, while maintaining a given log book and a checklist.

4.4.13  The facility has been equipped with an emergency lighting system and backup generator which is automatically self-start and connected to the facility at power failure.

4.4.14  Floor plans, product flow plans, or any segregation charts that are relevant to the facility, its production or any other operations are up-to-date and available with responsible persons.

4.5       Secure Supply Controls
4.5.1    The company has established procedure for supplier evaluation and acceptance as well as policy for rejecting deliveries or materials that are not comply with quality/safety inspections or suspected for any sort of contamination or treat. Unauthorized deliveries are rejected and returned to the sending party.


4.5.2    The company has established a food safety procedure for withdrawal and recall, which is capable enough to manage an incident of withdrawal or recall where relevant persons are appointed with given responsibilities and proof tested with a recorded mock recall event every year.

4.5.3    The transportation department has authorized for pre-notification and scheduling of all shipments and empty trailers. “Holding” shipments that have not been pre-scheduled shall be kept at a predetermined location until the load can be verified.

4.5.4    Delivery schedules shall be established, unloading crews are supervised and product or raw materials are being inspected before acceptance and send samples to the safety/quality checks if necessary. The materials suppliers and drivers are required to check in prior to offloading to verify shipping documentation and driver’s identity.

4.5.5    The company has established procedures for inspection of incoming shipments for damage and signs of tampering. The specific notices are issued requiring all doors and hatches on incoming shipments to be sealed with a numbered seal that corresponds with a seal number on the accompanying shipping documentation. The company has also advice the relevant personnel on sealing outgoing shipments and annotating the seal number on accompanying documents.


4.5.6    The company will not accept any returned/refused containers or reusable packing materials unless they are sanitized and certified for reuse. However, case by case approval shall be granted on such individual case.

4.5.7    Products that are returned due to the tampering issues are properly inspected, evaluated, reported and recorded for any treats.

4.5.8   The company has established system to recognize and report discrepancies in finished products, raw materials, packaging/labels and chemical materials.

4.5.9    Domestic products and imported products or items shall be stored separately.

4.6       Background Screening  
4.6.1    The background screening shall be conducted through: comprehensive reference checks with previous employers (prior 2 employers), which should include validation of employment dates and compensation details in addition to qualitative information.

4.6.2    All provided educational qualifications, including degrees, diplomas or certificates will be independently checked for white-collar employees. If employment dates have not been validated by the reference checks, they need to be separately or independently validated where gaps in employment should be thoroughly investigated.

4.6.3   A police certificate shall be included in the personnel file, criminal records should be independently checked as the final step of the employment selection process. If it is not legally possible to obtain access to criminal records, a Certificate of Good Conduct from the police department or court jurisdiction will be pursued where it is possible and available.

4.6.4    Credit checks shall be conducted for specific roles that, by their nature, provide easy access to the funds of the Company or its employees, i.e., certain Finance/Payroll/HR/Senior management positions. Driving records shall be verified for those positions involved with driving automobiles, trucks, tractors, forklifts, etc.

4.6.5    The suppliers who can demonstrate their ability to carry out effective screening measures will be preferred over those who cannot. In accordance with local laws, company expects suppliers to carry out a reasonable level of reference checking on their individual suppliers.

5.0       References
5.1       Company data base on product recalls, complaints and market returns
5.2       Company employee personnel files  
5.3       Product identification and traceability procedure – Doc reference no
5.4       Gap analysis/annual self-assessment checklist – Doc reference no
5.5       HR manual – Doc reference no
5.6       Hazard Assessment
5.7       Emergency preparedness and response procedure – Doc reference no
5.8       Supplier evaluation and selection – Doc reference no
      

6.0       Records
6.1       Background screening reports
6.2       Externally available data on similar treats to the production
6.3       Visitor and employee access control records
6.4       Product or security complains, analysis and actions taken records
6.5       Self-assessment and annual evaluation records
6.6       System update records and new risk assessment conducted



No comments:

Post a Comment