GDST1 0TechnicalImplementationGuidancefinal
GDST1 0TechnicalImplementationGuidancefinal
Document Summary
GDST Standards and Guidelines for
Document Name Interoperable Seafood Traceability Systems –
Technical Implementation Guidance
Document Date February 10, 2020
Document Version 1.0
Released to GDST members
Document Status
(publication to follow on March 16, 2020)
Additional technical guidance and
Document Description recommendations to facilitate implementation of
the GDST Core Normative Standards
This document is part of a packet of interconnected documents and resources that together
constitute the full set of GDST 1.0 materials. The packet as of February 10, 2020, includes:
Document Title Document Date Version Contents
Overview of GDST 1.0 packet
Guide to GDST 1.0
February 2020 v1.0 contents and “How to Use These
Materials
Documents”
Executive Summary February 2020 v1.0 Two-page description of GDST 1.0
Core Normative The GDST 1.0 standards
February 2020 v1.0
Standards themselves
E-spreadsheet of appendices to
Basic Universal List of
February 2020 v1.0 Core Normative Standards – part
KDEs (spreadsheet)
of GDST 1.0 core standards
Nontechnical background and
Explanatory Materials February 2020 v1.0
introductory materials
Technical Implementation Additional technical materials to
February 2020 v1.0
Guidance facilitate implementation
A drafting history of the industry-led inputs into GDST 1.0 appears in Section 1.3 of the
Explanatory Materials document.
For online access to the full GDST 1.0 packet, visit http://traceability-dialogue.org/core-
documents/gdst-1-0-materials/.
For additional information, please contact the GDST Secretariat at info@traceability-
dialogue.org.
GDST Technical
Implementation Guidance – p. 2 of 29
This document does not cover all aspects of the EPCIS, CBV, or GTSs of GS1 but utilizes and
extends them for addressing IUU fishing and other sustainability challenges in seafood supply
chains. We strongly recommend referencing the following documents when implementing the
EPCIS extensions described in the Core Normative Standards and Technical Implementation
Guidance:
1. GS1 Global Traceability Standard 2.0 (GTS2)1 explains how traceability systems are
constructed based on the GS1 system of standards, specifically EPCIS.2 This document
provides much of the language and fundamental architecture assumed in this guide.
2. GS1 Foundation for Fish, Seafood and Aquaculture Traceability Guideline3
provides a global view of seafood traceability from first sale to retail.
3. GS1 US and NFI Seafood Traceability Implementation Guide4 provides specific
guidance for North American seafood sold at retail.
NOTE: Unlike the GDST Core Normative Standards, this document and other GDST
explanatory materials are the product of the GDST Secretariat and have not been subjected to
consensus decision-making by GDST members. These materials do, however, reflect extensive
dialogue with GDST members and technical inputs from members and other external experts.
1 https://www.gs1.org/standards/traceability/traceability/2-0
2 https://www.gs1.org/standards/epcis
3 https://www.gs1.org/standards/traceability/guideline/gs1-foundation-fish-seafood-and-aquaculture-
traceability-implementation
4 https://www.gs1us.org/industries/retail-grocery/standards-in-use/fresh-foods
GDST Technical
Implementation Guidance – p. 3 of 29
Table of Contents
DOCUMENT SUMMARY ............................................................................................................. 1
TABLE OF CONTENTS ............................................................................................................... 3
ABBREVIATIONS AND ACRONYMS .............................................................................................. 4
1. TRACEABILITY DATA AND TRACEABILITY SYSTEMS ............................................................... 5
1.1. Traceability Data within an Organization ...................................................................... 5
1.2. Traceability Data across the Seafood Supply Chain ..................................................... 5
1.3. Managing Traceability Data .......................................................................................... 5
1.3.1. Traceability Data Types and Sources .................................................................... 5
1.3.2. Sensitivity and Data Security ................................................................................. 6
1.3.3. Data Sharing.......................................................................................................... 7
1.3.4. Quality and Verification .......................................................................................... 7
1.4. Seafood Traceability Systems ...................................................................................... 7
2. SHARING TRACEABILITY DATA AND COMMUNICATION PROTOCOLS ......................................... 8
2.1. Communication Protocol Conditions ............................................................................. 8
2.2. Additional Considerations ............................................................................................. 8
2.3. Communication Scenarios ............................................................................................ 8
2.4. Digitized Business Communication Protocol Recommendation .................................... 9
2.4.1. Authentication ........................................................................................................ 9
2.4.2. REST API Methods................................................................................................ 9
2.4.3. More Help .............................................................................................................10
2.5. Nondigitized Communication Recommendation ..........................................................11
2.6. Mixed Communication Recommendation ....................................................................11
2.6.1. Digitized Business Sending to Nondigitized Business ...........................................11
2.6.2. Nondigitized Business Sending to Digitized Business ...........................................11
3. CRITICAL TRACKING EVENT EXAMPLES – WILD-CAUGHT TUNA TO CANNED TUNA ................. 12
4. CRITICAL TRACKING EVENT EXAMPLES – AQUACULTURE .................................................... 17
5. INTERNAL TRACEABILITY – COMMINGLING AND TRANSFORMATIONS...................................... 20
6. TRACEABILITY DATA USE CASES ...................................................................................... 22
6.1. Traceback ...................................................................................................................22
6.2. Traceforward ...............................................................................................................23
6.3. Aggregation Report for CSR ........................................................................................23
6.4. Mass Balance ..............................................................................................................23
6.5. Chain of Custody .........................................................................................................23
7. DISPOSITION FOR PRODUCT FIRST ENTERING COMMERCE .................................................. 24
– APPENDIX 1 – .................................................................................................................... 25
INTRODUCTORY GS1 MATERIALS ............................................................................................ 25
– APPENDIX 2 – .................................................................................................................... 29
GDST GITHUB ..................................................................................................................... 29
Abbreviations and Acronyms
• Static master data: Infrequently changed data that describes locations, products,
parties, locations, and assets, e.g., “Address,” and “Species Code and Name.” Data is
often first captured in accounting software applications followed by logistics applications.
Trading partners typically share their location and product information via paper,
spreadsheets, centralized web portals, and the GS1 Global Data Sharing Network. The
challenge is often the lack of a single source of truth, often leading to erroneous master
data.
• ILMD: Data that varies over different instances of production and is associated with
either a specific serialized item (I) or lot (L), e.g., “First Freeze Date” and “Catch Area.”
This information is most frequently provided in human-readable format on the product
case or pallet label and must be entered upon receipt by the buyer. The same types of
systems that capture this data also capture visibility event data (below).
• Transaction data: Data related to a business transaction, such as the completion of a
transfer of ownership (purchase and sales orders, invoices) or a transfer of custody
(proof of delivery, advanced shipment notice). This is commonly accomplished through
EDI and AIDC.
• Visibility event data: Visibility events are usually captured by existing business systems
– warehouse and/or accounting software, MES, ERP software, and on-vessel systems
for e-logbook and vessel monitoring systems. Increasingly, organizations are investing in
fit-for-purpose traceability systems and applications to support their consumer visibility
efforts or to meet retailer demands.
In the Core Normative Standards, KDEs are mapped to which are master, ILMD, or event-level
data. The recommended approach is to share both master and event-level data governing the
pedigree of the given batches/lots.
2. The ability to know that the communication came from the purported entity or supply chain
actor.
3. The ability to know that the communication was not intercepted and changed.
4. The ability to know the communication’s level of transparency and that only authorized
entities may see what is being communicated.
5. The ability to receive an acknowledgment that the communication was received and to know
the status on the processing of the communication, such as error messaging and success
statuses.
2.4.1. Authentication
The REST API would support the following authentications:
1. No authentication – Meaning anyone can query the REST API and find out information.
2. Basic authentication – Meaning that the authorization header on the HTTP request
contains the following format: Basic <username>:<password> with the
<username>:<password> encrypted into Base64 so that it is not clear text.
3. API key – Meaning that there is a query parameter specified like
?key=<insert_API_key_here>.
On top of authentication, it’s possible that, depending on whether authentication is provided, the
REST API could return different levels of detailed information. For example, if authentication is
not provided, it might provide a less detailed version of the information, stripping out any
sensitive information and delivering just the bare minimum.
EPCIS Query Interface. More information on methods available through the EPCIS Query
Interface are available here and on the GitHub.
For the purpose of this section, we will assume that the root URL for the REST API is
https://example.org/GDST/.
Full examples of requests and responses, including the request URL, request HTTP headers,
request HTTP body, response HTTP headers, and response HTTP body, can be found on the
GitHub here.
Pull Events
This is a GET method where the sender is requesting a list of events that are associated with a
specific EPC.
HTTP operation: GET
Path: /events
Example REST URL
https://example.org/GDST/events/{EPC}
Response: EPCIS document
Response content type: application/xml
Push Events
This is a POST where the sender is sending one or more EPCIS events to the receiver.
HTTP operation: POST
Path: /events
Example REST URL
https://example.org/GDST/events/
Response: Nothing; will rely on the HTTP response code to determine the response.
Request content type: application/xml
Request format: EPCIS message
Dimension V1 V2 V3 V4
ObjectEvent
ObjectEvent ObjectEvent ObjectEvent
Why ADD,
OBSERVE, Landing OBSERVE, Transporting OBSERVE, Receiving
Wild Harvest
Traceable Object
Traceable Object (Tuna) Traceable Object (Tuna) Traceable Object (Tuna)
What (Tuna)
Quantity, UOM Quantity, UOM Quantity, UOM
Quantity, UOM
When Date, Time, Zone Date, Time, Zone Date, Time, Zone Date, Time, Zone
Vessel Operator/Owner
Vessel Identifier
Vessel Registration
Public Vessel Registry
Hyperlink
Master Data Customer Contact Info
Vessel Flag Port Information
Header “Ship To” Address
Catch Identifier
Availability of Catch
Coordinates
Satellite Vessel Tracking
Authority
GDST Technical Implementation Guidance – p. 14 of 29
Dimension V1 V2 V3 V4
Catch Area
Species
Economic Zone
ILMD Fishing Gear Type
Production Method
Harvest Start/End
Certification List
Dimension V5 V6 V7 V8
ObjectEvent
TransformationEvent AggregationEvent ObjectEvent
Why OBSERVE,
ADD ADD, Aggregation Shipping
Receiving
Dimension V5 V6 V7 V8
Parent:
Input: Whole Container
Tuna
What Children: Container Container
Output: Frozen
Loins Frozen Tuna Loin
Cases
Date, Time,
When Date, Time, Zone Date, Time, Zone Date, Time, Zone
Zone
Plant
Operator/Owner Customer Customer
Master Data Contact Info Contact Info
Plant Identifier
Header “Ship To” “Ship To”
Frozen Tuna Loins Address Address
ID
Lot Number
Production Date
ILMD
Storage State
First Freeze Date
AggregationEvent ObjectEvent
TransformationEvent AggregationEvent
Why DELETE, OBSERVE,
ADD ADD, Aggregate
Disaggregate Shipping
When Date, Time, Zone Date, Time, Zone Date, Time, Zone Date, Time, Zone
Canner
Operator/Owner Customer Contact
Master Data
Canning Plant Info
Header Identifier “Ship To” Address
Canned Tuna ID
Preservation
Technique
ILMD
“Best Before” Date
MSC Certification
GDST Technical Implementation Guidance – p. 17 of 29
Product Owner
Product Owner Product Owner Product Owner
Information
Tech Info Information Provider Information Provider Information Provider Provider
Geolocation of Event Geolocation of Event Geolocation of Event Geolocation of
Event
Dimension V1 V2 V3 V4
ObjectEvent TransformationEvent
TransformationEvent ObjectEvent
Why ADD, ADD,
Add OBSERVE, Shipping
Farm Stock Farm Harvest
Input:
Input: Ingredients Feed ID, Broodstock ID
What Broodstock ID Live Shrimp ID
Output: Feed ID Output:
Live Shrimp ID
Source: Farm
Where Feed Mill Hatchery Farm Destination:
Processor
When Date, Time, Zone Date, Time, Zone Date, Time, Zone Date, Time, Zone
Dimension V1 V2 V3 V4
Dimension V5 V6 V7 V8
Parent: Pallet
Input: Live Shrimp ID
What Children: Pallet Pallet
Output: Frozen Shrimp
Frozen Shrimp Cases
When Date, Time, Zone Date, Time, Zone Date, Time, Zone Date, Time, Zone
GDST Technical Implementation Guidance – p. 20 of 29
Dimension V5 V6 V7 V8
Product Form
ILMD Production Date
Product Country of Origin
In this diagram, catches are commingled after landing and before receipt by the primary processing facility. Catch identifiers
input to an output identifier associated with the commingled product (through either a GTIN + Lot, UUID, or URL), which the
processor receives and feeds into their processing (transformation) steps. As shown above, there may be multiple production
lines, splitting, and recombining of product in the factory. The GDST realizes that current capabilities of tracking these internal
CTEs may be difficult or will take some time to implement. When combined with upstream commingling events, a production
code (batch/lot) may contain many potential catches, which may be less than ideal for regulatory requirements or making
sustainability claims. As digitized traceability using the GDST standards increases, it is anticipated that techniques and
reconfiguring of internal traceability practices and systems will improve this granularity. At minimum, all possible inputs should
be included in commingling and transformation steps and associated with the output’s identifier. If a processor cannot give this
level of specificity at individual transformations within the factory, they can be treated collectively in the interim (i.e., treating
transformations 1.1, 1.2, 1.3, and 2.0 as one CTE). Traceability should lean more toward overinclusion of inputs rather than
underinclusion. Given a product identifier, they should be able to trace back to all possible inputs to the batch/lot (Section 6.1).
6. Traceability Data Use Cases
6.1. Traceback
Traceback is a common, straightforward use of traceability data, beginning with the traceable
object of interest, e.g., the case of frozen shrimp shown in the previous examples.
1. Query the event repository for all events related to the Object Identifier and location(s) of
interest (receipts, shipments, pack, unpack, transformation). If no location is specified, all
events at all locations will be examined.
2. Order the events by time stamp and group by terminal destination.
3. From each terminal destination, follow the shipping and receiving (source/destination)
and trail back to either the original source (catch or harvest) or the output of a
transformation event.
4. From the transformation event, repeat steps 1-3 for each Input Object Identifier.
5. The resulting map looks something like this:
Broodstock
Ingredient
Retail
Feed Shrimp Product
Ingredient
6.2. Traceforward
Traceforward is also a common use of traceability data, beginning with the traceable object of
interest, e.g., the ingredients used in a specific type of feed.
1. Query the event repository for all events related to the Object Identifier and location(s) of
interest (receipts, shipments, pack, unpack, transformation).
2. Order the events by time stamp.
3. From the source, follow the shipping and receiving (source/destination) trail forward to
the input of a transformation event.
4. From the transformation event, repeat the steps 1-3 for each output of the transformation
event and for each new Input Object Identifier found.
5. The resulting map looks something like this:
Ingredient
– Appendix 1 –
Introductory GS1 Materials
GDST Standards and Guidelines users and stakeholders wishing to have a basic introduction to
GS1 and the GS1 tools integrated into the GDST approach may wish to consult the following
resources:
1. GS1 Global Traceability Standard 2.0 (GTS2)5 explains how traceability systems are
constructed based on the GS1 system of standards, specifically EPCIS.6 This document
provides much of the language and fundamental architecture assumed in this guide.
2. GS1 Foundation for Fish, Seafood and Aquaculture Traceability Guideline7
provides a global view of seafood traceability from first sale to retail.
3. GS1 US and NFI Seafood Traceability Implementation Guide8 provides specific
guidance for North American seafood sold at retail.
The communication methods applied in the GS1 standards may be broadly classified in two
groups:
■ Push methods, where one party unilaterally transfers data to another in the absence of a
prior request. Push methods may be further classified as:
• Bilateral party-to-party push, where one party transfers data directly to another party.
• Publish/subscribe, where one party transfers data to a data pool or repository, which
in turn pushes the data to other parties that have previously expressed interest in
that data by registering a subscription (“selective push”).
• Broadcast, where a party publishes business data in a well-known or publicly
accessible place, such as a webpage or the GDSN, where it may be retrieved by any
interested party. Broadcast does not necessarily mean that the data is available to
anyone; the data may be encrypted for a specific intended user, or the broadcast
channel (e.g., website) may require the receiving party to authenticate and may grant
access to the broadcast data only according to specific access control policies.
■ Pull or query methods, where one party makes a request for specific data to another
party, which in turn responds with the desired data. Note that in the classification of push
5 https://www.gs1.org/standards/traceability/traceability/2-0
6 https://www.gs1.org/standards/epcis
7 https://www.gs1.org/standards/traceability/guideline/gs1-foundation-fish-seafood-and-aquaculture-
traceability-implementation
8 https://www.gs1us.org/industries/retail-grocery/standards-in-use/fresh-foods
GDST Technical
Implementation Guidance – p. 26 of 29
methods above, the broadcast method may also involve a pull query in order to retrieve the data
from a publicly accessible place (such as a website).
The table below details how these push and pull methods work with various choreographies.
On-demand Selective
Traceability
Publishing/contributing selective query standing query
choreography
(synchronous) (asynchronous)
One step up Push data to relevant Pull Publish and
trading partner subscribe
One step down (request,
response) (receive push
notifications
Example: bilateral EDI or
matching
EPCIS message
previous standing
query
subscription)
Centralized Push data to centralized Pull via API N/A
repository via API, file
(request,
upload, mobile device, or
response)
web browser data entry
Examples: most
commercial traceability
applications operated by a
supply chain owner (IBM
Food Trust, Trace Register,
FoodLogiQ, Ftrace, Origin
Trail, VeChain, TE-FOOD,
Fishcoin, etc.)
Discovery of Push referral link to a Pull N/A
networked discovery service
(request,
resources
response)
Examples: GS1 Digital
Link, GS1 GDSN
Networked Push data to own Pull Publish and
repository subscribe
(request,
response) (receive push
notifications
Example: distributed
matching
EPCIS repository
previous standing
query
subscription)
GDST Technical
Implementation Guidance – p. 27 of 29
Decentralized Push and pull data to/from one node for validation then inclusion
and replicated and replication in decentralized repository or ledger. This enables
applications to build off each other because some or all of the data
is exposed on a blockchain.
This approach results in asymmetric visibility across the supply chain, in which downstream
parties receive a complete copy of all relevant upstream data while the upstream parties have
no visibility downstream beyond their immediate one-down customer. This ensures data security
for supply chain owners (retailers, restaurants) and provides explicit, fine-grained control for
what is shared at each stage in the supply chain. For example, a retailer may prefer a summary
of the pedigree, while a certification body might prefer a complete, unedited original event
listing. This method would serve both purposes. Below is an example:
Processor
Catch
Fisher Catch
Landing Landing Retailer
Processing Regulator
Shipping
The collection of traceability data from other parties and the provision of data to other parties
are essential components in distributed traceability systems.
Data-sharing choreographies are all, in principle, capable of selectively restricting access to the
meaning of the exchanged data on a need-to-know basis, although they differ in the
mechanisms used and in the ability to control whether a receiving party shares the data with
additional parties:
■ Some of the choreographies involve bilateral communication between an information-
requesting party (querying party) and an information-providing party, which may be the original
contributor of the data or a shared repository holding the data. The privacy of such bilateral
GDST Technical
Implementation Guidance – p. 28 of 29
communications can be ensured via mutual authentication, the use of secure communication
channels, and the potential encryption of the data payload or messages.
■ Decentralized and replicated choreographies can involve a different approach to
selectively restricting access to the meaning of the data. In the case of a blockchain ledger, trust
in the ledger is ensured if everyone is able to independently inspect the entire ledger, including
all its data, in order to be assured that no historical transaction data has been subsequently
altered. Although this openness necessarily means that anyone can read all the data in the
ledger, it is still possible to hide the meaning of sensitive data either by encrypting such data or
by storing a hash value in the ledger. If hash values are stored in a blockchain ledger, the
original data is typically stored elsewhere and exchanged by another mechanism, while the
hash value recorded in the blockchain ledger effectively archives a “tamper-evident seal” that
corresponds to what the data originally looked like. Both security approaches compromise the
first principle of the technology – that everyone can independently inspect all the data in the
ledger to ensure completeness and accuracy. Until this fundamental issue is resolved,
decentralized and replicated technologies will not provide a demonstrably better tool for
traceability.
GDST Technical
Implementation Guidance – p. 29 of 29
– Appendix 2 –
GDST GitHub
The GDST anticipates that the standards documented in this packet of materials will not
address every supply chain contingency, certification scheme, or regulatory requirement.
Because of the extensibility of EPCIS, there is the potential to have “too much” flexibility,
wherein solution providers and seafood companies represent this information in divergent
methods. To have a concerted approach and standard reference, the GDST has created a
GitHub repository to extend documentation to new or non-normative situations, such as:
• Specific documentation to common certifications
o E.g., MSC/ASC and Fair Trade
• Regulatory guidance
o E.g., SIMP or EU eCDT
• Gear-type documentation
o E.g., trawling catch events
• Species-specific documentation
o Representing life cycle events for specific aquaculture species
The GDST GitHub utilizes the ticket system already in use by the site to flag, process, and
manage new issues or documentation needs. The site uses Spectrum for users to discuss in-
process issues, and the site will be moderated by the GDST Secretariat. Details of the process,
governance, and structure are housed on the repository site.