Food Defense and
Food Safety
In the context of food safety and food defense, both
systems drive the efficiency of food sustainability efforts; they are the means
to align consumer requirements for safe food with confidence for consumption. Food
security concentrates on sustainable supply and distribution of food products
and how does that affect the actions of a farmer, or food distributor or
manufacturer, or food service outlet as well as how does it impact the food
system? Food security guides the efficiency and effectiveness of food safety,
which in return strengthens food security. The food defense and food safety informs
the practical ways of inspiring confidence in the foods consumed, while lowering
or eliminating foodborne illness. There is close interplay between the physical
aspects of producing food and the financial realities of business. Nonetheless,
there are political and cultural (even religious) realities of food production
and consumption, along with the impact that producing food has on the
environment. Most importantly, there are the very genuine personal
physiological and psychological impacts on food that are consumed.
Hence, development of food defense program will be more
effective and efficient with a food safety program. As such, following food
defense procedure has developed to upgrade an existing food safety system with
few additional documents while adapting to existing protocols with amendments wherever
necessary. The given program is a generic example, which is not very
comprehensive where individual plants can adjust according to their
requirements where necessary. The procedure was developed for the educational proposes
where customization are mandatory if any person wants to use it as a company
own procedure.
FOOD DEFENSE PROCEDURE
Standard Operating Procedure for Food Defense Program
Distribution:
1. Chairman
2. General
Manager
3. Quality
Assurance Manager
4. Factory
Manager – XYZ Factory
5. Production
Manager – QUV Factory
6. Sales
Manager
7. Purchasing
Manager
8. Security
Officer
9. Administration
Officer
1.0 Objective
To quickly
and accurately identify, respond to, and contain threats or acts of intentional
contamination
are strictly controlled through planned arrangements, requirements with the
existing food safety management system, and is being effectively implemented
and updated continuously.
2.0 Scope
This procedure
covers all the security measures applied including, risk assessments, annual
evaluations, employee screening, access control and inspection related to food
defense and food safety.
3.0 Responsibilities
Overall
– General Manager
Direct
– Factory Manager
Security
requirements –
Security Officer/Consultant
Maintain
data collection – Factory Manager
Maintain
food defense system – Quality Assurance Manager
Maintaining/Updating/Documenting – Food defense team/food safety team
Preparation
of relevant documents
4.0 Activities
4.1 General
4.1.1 The XYZ Pvt. Ltd.,
who manufacture, process and pack orthodox black tea shall have following food
defense procedure to deter and prevent intentional contamination and will have
protocols in place to quickly and accurately identify, respond to, and contain
threats or acts of intentional contamination. Nonetheless, company registered
green leaf collectors and individual suppliers will ensure their suppliers
adopted to given protocols and implement appropriate controls which will be
audited annually.
4.1.2 The laws and
legislation requirements governing food defense vary from country to country.
Hence, company has defined a minimum set of food defense standards to help
company meets legal and consumer expectations, where selected standards may
exceed the requirements of a specific country or area.
4.1.3 The management
has selected food safety team as the plant food defense team where additional
consultants on the specific requirement will be hired from the outside.
4.1.4 The food defense
plan shall be developed along with the food safety plan, covering areas which
are not covered during the hazard analysis in-line with intentional
adulterations on the company’s products.
4.1.5 The company’s
written food defense plan includes vulnerability assessment, including required
explanations, to identify significant vulnerabilities and actionable process
steps. The process has defined mitigation strategies, including required
explanations for food defense monitoring procedures and corrective actions verification
plans for the complete assessment of food defense program.
4.1.6 Statutory and
regulatory authorities and other organizations including clients/ distributors/supermarket
chains that may have an interest or impact on food defense shall be informed as
appropriate on issues concerning them. Such communication shall be done by or
under the approval of General Manager.
4.1.7 Any inquiries, customer feedback or any other
information from supermarket chains, including customers, suppliers and
statutory and regulatory authorities regarding food defense shall be
communicated to Quality Assurance Manager. Customer complaints and related
activities on food defense also shall be communicated to Quality Assurance
Manager. All above information and issues shall be documented and communicated.
4.1.8 The food defense team has selected mitigation
strategies for actionable process steps, which identify and implement
mitigation strategies at each actionable process step to significantly minimize
vulnerabilities, including a written explanation of how the strategy can
minimize the vulnerability.
4.1.9 Food
defense monitoring plan shall monitor the mitigation strategies with adequate frequency
to provide assurances that they are consistently performed. Verify that
mitigation strategies are properly implemented and appropriate decisions about food
defense corrective actions are being made, and implemented while conducting validation
of the food defense plan as appropriate.
4.2 Gap Analysis/Self-assessment
4.2.1 A gap analysis/self-assessment
shall be conducted prior to new food defense program, and every year there will
be an annual review to the existing system to identify gaps, new treats,
adaptability, suitability and continuity. Thus, company can maintain its food
defense program by actually fixing gaps identified in assessments and modifying
the plans and programs as conditions change. The key activities are;
a)Identify
the most vulnerable components of the site’s operations and, determine how to
use resources, procedures and protocols most effectively to reduce risks;
b)Identify
potential areas of exposure, or “gaps” in the site’s security measures; and,
c)Once
the gaps are identified, countermeasures (such as program or process
improvements or physical security hardware upgrades) can be used to bridge or
fix the gaps.
4.2.2 The system shall
be audited under the ongoing internal audit plans based on this procedure,
however company will hire an external food defense auditor bi-annually with
internal audit team to make sure system is runs at its optimum conditions. The
internal audits shall focus on the plans and procedures developed while
assessing the site’s implementation of the plan which will show any gaps that
need to be fixed.
4.2.3 The food defense
system of the company shall be adapted to the PAS 96: 2014 as the main food
defense standard that will be used to develop company’s food defense plan and
will use the PAS 96’s Risk Assessment methods to evaluate its food defense
system requirements together with Hazard Analysis of ISO 22000 FSMS.
4.2.4 The company has
developed a comprehensive risk assessment checklist for the evaluation of risks
together with PSA 96:2014.
4.2.5 Company has established employee hiring
manual, which includes a minimum level of background checks for all the
employees.
4.3 Access Control and Visitor
Management
4.3.1 Effective access
control is the foundation of a successful food defense plan where company has
implemented an automated access control system for the office areas and
production with identification colours for each sections, ID cards for
employees with their credentials and limited access visitor passes.
4.3.2 Security shall
identify and document all individuals gaining access to the facility, limit
access to those who have a legitimate reason to be there, control pedestrian
and vehicle traffic at the site and properly report and respond to incidents
challenging this policy.
4.3.3 The visitors and
general employees shall be controlled for gaining access to processing and
manufacturing, raw material, ingredient, packaging storage areas, hazardous and
chemical storage areas as well as shipping and receiving areas. The access to
these areas are limited to the individuals who require access in order to
complete their assigned tasks and their uniforms are specifically colour coded
relevant to the working area.
4.3.4 The vehicles
coming in and out going of the facility shall be inspected, recorded and
verified before gaining access or leaving whether they are belong to the
company, employees, visitors or suppliers. The parked vehicles shall display a
placard or decal issued by the facility.
4.3.5 The
visitors are advised to check in and check out when entering and leavening the
facility. A visitor log book is maintained and security will scrutinize any
visitor before entering the facility and connected to the specific person in
charge of the visit.
4.3.6 The
visitors are screened and verify the visitation before granting the access to
the facility as well as areas where visitor will have specific access to.
4.3.7 The visitors are
accepted though general office and accompanied by a company executive during
entire visit. The visitor is not left alone for any circumstances other than
use of washroom or inside the visitor’s resting area.
4.3.8 The company shall
provide passes for all the registered suppliers while security has been advised
to scrutinize suppliers entering to the facility with specific persons
registered.
4.3.9 If
allergens are handled by the facility for any specific activity, they shall be
segregated from the products or raw materials to avoid any cross contamination.
4.4 Secure Facility Controls
4.4.1 All the perimeter
areas are demarcated, high fenced, with specific in and out gates which are
strictly controlled by the security personnel and surveillance camera (CCTV)
system. Fencing, surveillance cameras and security personnel shall be deployed
as to the requirements and risks identified.
4.4.2 The facility
shall be kept enclosed all the times, the entrance gates are controlled through
a security personnel.
4.4.3 All the buildings
or facilities shall be under lock and key when they are not in use. Storages,
vehicles, containers, trailers or any other temporary holding units which are
not being used are kept locked.
4.4.4 Secure
all the agricultural chemicals and verify inventory on a schedule basis with
restricted access keys.
4.4.5 All the
specific keys to the doors shall be kept strictly controlled, there is a
specific key registry which identifies the specific key holders for each access
door in the facility. The areas specifically restricted for general employees,
visitors, and untrained employees will be demarcated, informed and sign boards
are posted. If any employee given a specific access to a restricted area where
is not his/her duty station, they have to record, sign and receive the specific
access keys which will be strictly regulated and controlled on the basis of
case by case.
4.4.6 When the
employees are terminated or resigned uniforms, name tags, identification badges
shall be collected from them prior termination/resignation.
4.4.7 The
company mails are collected at the security point, verified, recorded and
delivered to the office; the mails are distributed through administration
officer, asking individually collect it from the office.
4.4.8 Personnel
items are not allowed out of the rest room, all the belongings of employees are
kept away from the production and storage areas.
4.4.9 Computer
and network access shall be granted to the specific personal according to their
job functions once it is a necessity, other personnel are restricted to the
access.
4.4.10 All the
transactions are recorded and the company has established a traceability
system, which includes computer based transactions and all the manual
transactions.
4.4.11 The
security personnel are advised to conduct routine security inspections of the
premises for signs of tampering, criminal or terrorist activities or any
noticeable incidents.
4.4.12 Security
has been instructed to verify security of doors and windows, while maintaining
a given log book and a checklist.
4.4.13 The
facility has been equipped with an emergency lighting system and backup
generator which is automatically self-start and connected to the facility at
power failure.
4.4.14 Floor
plans, product flow plans, or any segregation charts that are relevant to the
facility, its production or any other operations are up-to-date and available
with responsible persons.
4.5 Secure Supply Controls
4.5.1 The company has
established procedure for supplier evaluation and acceptance as well as policy
for rejecting deliveries or materials that are not comply with quality/safety
inspections or suspected for any sort of contamination or treat. Unauthorized
deliveries are rejected and returned to the sending party.
4.5.2 The company has
established a food safety procedure for withdrawal and recall, which is capable
enough to manage an incident of withdrawal or recall where relevant persons are
appointed with given responsibilities and proof tested with a recorded mock
recall event every year.
4.5.3 The
transportation department has authorized for pre-notification and scheduling of
all shipments and empty trailers. “Holding” shipments that have not been
pre-scheduled shall be kept at a predetermined location until the load can be
verified.
4.5.4 Delivery
schedules shall be established, unloading crews are supervised and product or
raw materials are being inspected before acceptance and send samples to the
safety/quality checks if necessary. The materials suppliers and drivers are
required to check in prior to offloading to verify shipping documentation and
driver’s identity.
4.5.5 The company has
established procedures for inspection of incoming shipments for damage and
signs of tampering. The specific notices are issued requiring all doors and
hatches on incoming shipments to be sealed with a numbered seal that corresponds
with a seal number on the accompanying shipping documentation. The company has
also advice the relevant personnel on sealing outgoing shipments and annotating
the seal number on accompanying documents.
4.5.6 The company will
not accept any returned/refused containers or reusable packing materials unless
they are sanitized and certified for reuse. However, case by case approval
shall be granted on such individual case.
4.5.7 Products
that are returned due to the tampering issues are properly inspected,
evaluated, reported and recorded for any treats.
4.5.8 The
company has established system to recognize and report discrepancies in
finished products, raw materials, packaging/labels and chemical materials.
4.5.9 Domestic
products and imported products or items shall be stored separately.
4.6 Background Screening
4.6.1 The background
screening shall be conducted through: comprehensive reference checks with
previous employers (prior 2 employers), which should include validation of
employment dates and compensation details in addition to qualitative
information.
4.6.2 All provided educational
qualifications, including degrees, diplomas or certificates will be
independently checked for white-collar employees. If employment dates have not
been validated by the reference checks, they need to be separately or
independently validated where gaps in employment should be thoroughly
investigated.
4.6.3 A police
certificate shall be included in the personnel file, criminal records should be
independently checked as the final step of the employment selection process. If
it is not legally possible to obtain access to criminal records, a Certificate
of Good Conduct from the police department or court jurisdiction will be
pursued where it is possible and available.
4.6.4 Credit checks
shall be conducted for specific roles that, by their nature, provide easy
access to the funds of the Company or its employees, i.e., certain
Finance/Payroll/HR/Senior management positions. Driving records shall be
verified for those positions involved with driving automobiles, trucks,
tractors, forklifts, etc.
4.6.5 The suppliers who
can demonstrate their ability to carry out effective screening measures will be
preferred over those who cannot. In accordance with local laws, company expects
suppliers to carry out a reasonable level of reference checking on their
individual suppliers.
5.0 References
5.1 Company
data base on product recalls, complaints and market returns
5.2 Company
employee personnel files
5.3 Product
identification and traceability procedure – Doc reference no
5.4 Gap
analysis/annual self-assessment checklist – Doc reference no
5.5 HR
manual – Doc reference no
5.6 Hazard
Assessment
5.7 Emergency
preparedness and response procedure – Doc reference no
5.8 Supplier
evaluation and selection – Doc reference no
6.0 Records
6.1 Background
screening reports
6.2 Externally
available data on similar treats to the production
6.3 Visitor
and employee access control records
6.4 Product
or security complains, analysis and actions taken records
6.5 Self-assessment
and annual evaluation records
6.6 System
update records and new risk assessment conducted
No comments:
Post a Comment