PSM Vaff f2f Eng Training Slides Spanish
PSM Vaff f2f Eng Training Slides Spanish
Assessment for
Food Fraud
1-Day Course
Housekeeping
Active learning
Reviewing learning
8
What is Food Fraud?
Exercise PSM_VAFF1001
What is Food Fraud?
Exercise PSM_VAFF1001
What is Food Fraud?
Remember
Mislabelling of product also has
regulatory consequences covering:
- Fines
- Government investigation/
inspection
Exercise PSM_VAFF1001
Identify the food fraud issue
Substitution (Taiwan)
Blending inferior grade palm
and other low-cost oils into a
mixture that was then
Olive oil marketed as high-grade olive
oil.
Turmeric
Green chilies
Mustard seed
•Argemone seeds
(used to add bulk
and weight)
Examples of Food Fraud
Other known food adulterations and substitutions
Black pepper
•Papaya seeds
(used to add bulk)
Top 10 Most At Risk From Food Fraud
Draft Report on the Food Crisis, Fraud in the Food Chain and the Control Thereof (2013/2091
(INI)) (European Parliament, 2013), the top 10 food products most at risk from food fraud
1 2 3 4
olive oil fish organic products milk
6 8
5 7
honey and spices (such as
grains coffee and tea
maple syrup saffron and chilli)
9 10
wine fruit juices
The Cost of Food Fraud
In your groups you need to identify a raw material that you believe would be a good
material for substitution or adulteration and record the following details on a flip chart:
➢The material selected.
➢Product characteristics e.g. powder, liquid, particulate and the impact it would have on potential for
substitution or adulteration.
➢The reason why you believe it to be a good material for substitution or adulteration.
Each group to feed back their answers to the rest of the class.
Exercise PSM_VAFF1002
Act like a criminal?
Sample answer
Exercise PSM_VAFF1002
National Crime Units
Vulnerability
Hazard Analysis Threat Analysis
Analysis Critical
Critical Control Critical Control
Control Point
Point (HACCP) Point (TACCP)
(VACCP)
HACCP, TACCP, VACCP
Food Safety
HACCP Hazards
Prevention of
unintentional/ Food borne
Science based
accidental illness
adulteration
TACCP
Food Defence
TACCP Hazards
Prevention of Behaviourally or
intentional ideologically
adulteration motivated
VACCP
Food Fraud
VACCP Hazards
Prevention of
Economically
intentional
motivated
adulteration
Section 2
Definitions
8
Definitions
Key definitions associated with food fraud:
Adulteration
Authenticity
Food fraud
Food defence
Substitution
Vulnerability Assessment
Food fraud definitions
Adulteration
The addition of an
undeclared material
into a food item for
economic gain.
Food fraud definitions
Authenticity
Food authenticity is
ensuring that food or raw
materials purchased and
offered for sale, are of the
nature, substance and
quality expected.
Food fraud definitions
Food Fraud
Fraudulent and intentional
substitution, dilution or addition
to a product or raw material,
or misrepresentation of the
product or material, for the
purpose of financial gain, by
increasing the apparent value
of the product or reducing the
cost of its production.
Food fraud definitions
Food Defence
Procedures adopted to assure
the safety of raw material and
products from malicious
contamination or theft
Food fraud definitions
Substitution
The action of replacing all
or part of a raw material,
packaging or process
chemical with another
substance (generally
lower grade) for financial
gain.
The financial reality of substitution
The company can buy a lower grade raw material at 40p per unit.
Exercise PSM_VAFF1003
The financial reality of substitution
Exercise PSM_VAFF1003
Food fraud definitions
Vulnerability assessment
A vulnerability assessment is a
search for potential
weaknesses in the supply
chain in order to prevent food
fraud (i.e. to prevent the
adulteration or substitution of
raw materials before they
arrive at the site).
Section 3
Global Standards
Requirements for
Vulnerability
Assessment 8
Global Standards Requirements
Objective of BRCGS
1.1.8 Senior management The company must have a system for identifying new risks to
commitment the authenticity of raw materials and packaging.
3.5.1.1 Supplier and raw material The risk assessment of each raw material or group of raw
Approval materials and packaging must consider the potential for
substitution or fraud.
5.4 Product authenticity, claims The company must have systems in place to minimise the risk of
and chain of custody purchasing fraudulent or adulterated raw materials and
packaging.
5.4.1 Product authenticity, claims The company must have access to information on historical and
and chain of custody developing threats relating to the risk of adulteration or
substitution of raw materials and packaging.
5.4.2 Product authenticity, claims The company must have documented vulnerability assessment
and chain of custody of all raw materials and packaging.
5.4.3 Product authenticity, claims Where a raw material is at risk of adulteration or substitution,
and chain of custody appropriate assurance systems and or testing must be in place
to reduce the risk
Global Standard Food Safety, Requisitos
Clausula 1.1.8
La empresa debe poder demostrar que mantiene Las empresas deben contar con sistemas para:
un conocimiento actualizado de la legislación • Acceder a la información
relevante, los avances científicos y técnicos, los • Revisar información
nuevos riesgos para la autenticidad de las
materias primas y los códigos de práctica de la • Actuar cuando corresponda.
industria.
Requisitos del Estpandar Global de
inocuidad alimentaria
Clausula 3.5.1.1 Evaluación de riesgos de materias primas de cada
materia prima o grupo, incluido el embalaje.
Substitución o fraude
Revisión anual
Global Standard Food Safety Requirements
El sitio debe
Todas las
llevar a cabo
Materias
una
Primas y
evaluación de
Materiales de
vulnerabilidad
Empaque
documentada
Evaluar el
riesgo
potencial de
adulteración o
sustitución
5.4.3 Aseguramiento y/o prueba
Exercise PSM_VAFF1004
5.4.3 Aseguramiento y/o prueba
Sus respuestas pueden incluir:
Certificados de análisis de
Pruebas de Materias Primas
proveedores de Mat. Primas
Uso de pruebas de
Auditorías a la Cadena de
manipulación o sellos en las
Suministro
materias primas entrantes
Ejercicios de balance de
Mejorar los controles de
masa en el proveedor de
aprobación de proveedores
materia prima
Cambios en la cadena de suministro, p.ejem
un cambio de proveedor o un cambio a una
cadena de suministro más corta
Exercise PSM_VAFF1004
Raw Material available tests
Exception procedures
Exercise PSM_VAFF1005
3.5.1.1
• Documented Risk assessment covering raw
material and packaging.
• Risk assessment to cover:
Risk • Allergen contamination
Assessment • Foreign-body risks
• Microbiological contamination
• Chemical contamination
• Substitution or fraud
• The risk assessment shall form the basis for the raw
material acceptance and testing procedure
Material • Risk assessment shall form basis for the supplier
acceptance approval procedure
• The risk assessments shall be reviewed at least
annually
Exercise PSM_VAFF1005
3.5.1.2 Supplier Approval
• Supplier approval
Procedure
• Exceptions
covering
• Up to date list of approved suppliers to be held
• Proceso de Vulnerabilidad
• Escaneo de Horizonte (Amenazas historicas y en
desarrollo)
− Evaluación del Riesgo de la Vulnerabilidad, cubriendo:-
Modelo cuadrático
− Utilizando Números Prioritarios de Riesgo
• Mapas de Cadena de Suministros
Evaluación de la Vulnerabilidad
1. Formar un Equipo
5.4.1Provision de 2. Identificación de Materiales
conocimiento e información
3. Escaneo de Horizonte
6. Mitigación de riesgos y
5.4.3 Resultados de la implementación de controles
evaluación de vulnerabilidad
7. Revisión
1. Formación del Equipo
Procesamiento Finca /
Manufactura Secundario Granja
Almacén Procesamiento
Primario
Materia Prima
1.
2.
3.
Empaques
1.
2
3. Escaneo de Horizonte
Vista
Panorámica
Recolección de Datos
(Amenazas historicas y actuales)
Revisión Hallazgos
• Minería de información & Análisis Documentales
de la internet de Datos
• Sitios de Gobierno
1. Divide en grupos
2. Determine los tipos de información que una compañía necesita
revisar cuando está en un ejercicio de Escaneo de Horizonte y
register los detalles en el diagrama provisto en sus notas.
3. Para proveer ayuda la próxima diapositiva ofrece un ejemplo del
tipo de información requerido.
4. Cuando se complete, cada grupo se le pedirá que de
retroalimentación al resto de la clase.
Exercise PSM_VAFF1006
Actividad de Escaneo de Horizonte
Incidentes
Históricos
Longitud y
complejidad de la
cadena de
suministro
Exercise PSM_VAFF1006
Actividad de Escaneo de Horizonte
Length and
Storage/
complexity of distribution
supply chain
Exercise PSM_VAFF1006
Ejemplos de recursos de información actual
Centres of https://twitter.com/fauthenticity
Expertise
Food
Fraud Research
& Methods
KEY FEATURES Mitigation
Science
for a safer world
Discussions
Organisations
pages
Policy &
Quality Law
Examples of Information arising from Horizon
activities
Example
4. Supply Chain Maps
Supply chain map example
4. Supply Chain Maps
Example
4. Supply Chain Maps
Example Supply Chain Map Using Excel
5. Supply Chain Maps
Step 2
Step 1 • Populate chain Step 3
• Determine map from: • Issue supply
the format - Knowledge of chain map to
to be used the supplier the supplier for
- Questionnaires verification
- Material
specifications
Step 4 Step 5
• Review verified Supply • Verify supply chain
chain map from maps during supplier
supplier and update audits where
vulnerability assessment appropriate
5. Undertaking a risk assessment
Simple Quadratic
Model
Different type of
risk assessment
tools appropriate
for Vulnerability
Assessment: Priority Risk Numbers
(PRN)
5. Simple Quadratic Model
Vulnerability
HACCP
Assessment
Likelihood of
Likelihood
Vs occurrence
X X
Likelihood of
Severity
detection
Likelihood of occurrence
•Historical incidents
•Emerging concerns (e.g. recent news or alerts)
•Geographic origin/length and complexity of the
supply chain
•Ease of access to raw materials
•Nature of the raw material e.g. value and market size
•Availability (e.g seasonality)
•Availability of adulterants or substitution
•The complexity of committing the fraud
5. Simple Quadratic Model
Likelihood of Detection
• Geographic origin
• Length and complexity of the supply chain
• Physical form (e.g. whole items, chopped, minced,
powdered or liquid
• Existing controls
• Routine product testing (consider the type of test and
how likely are the to detect any adulterated materials
and frequency of test.
• Ease of access to raw material (e.g. broken tamper-
proof seals are clear evidence of an attempt to access.
• Supplier audits
5. Simple Quadratic Model
Likelihood of occurrence
Very Likely/
Very unlikely Unlikely Fairly likely Likely Certain
(1) (2) (3) (4) (5)
Very likely/ A5
Certain A1 A2 A3 A4 A5
Likelihood of detection
(A)
Likely
B1 B2 B3 B4 B5
(B)
Fairly Likely
C1 C2 C3 C4 C5
(C)
Unlikely
D1 D2 D3 D4 D5
(D)
Very unlikely
E1 E2 E3 E4 E5
(E)
5. Simple Quadratic Model
Purchase of Manuka honey
(Likelihood of Detection)
• Geographic origin Relevant
Ease
Routine
Length of
Physical audits
product
form
Historical
and (i.e.
access(e.g. those
testing
complexity
Existing incidents
controls to of that
whole raw
the
• Length and complexity of the supply consider
material
(consider adulteration,
(e.g.
items,supply broken
chopped,
the type of
chain. tamper-
minced,
test and
chain. traceability,
proof
how
Basiclikely
Multiple seals
powdered
aremass
reports
supplier the balance
orare
to
liquid. clear
detect
indicating
approval.
• Physical form (e.g. whole items, testing
evidence
any etc of from
adulterated
historic
Buying direct
concerns.anmaterials
attempt
New to
chopped, minced, powdered or liquid access.
Physical
and frequency
Zealand forms means
of test.
producers is dilution
None
or substitution
preferred is relativelyfrom
to purchasing
• Existing controls
Refer
Few to geographic
straightforward.
internationally
non-producing traders.origin. –
• Routine product testing (consider the no additional
recognised controls
test available.in
type of test and how likely are the to operation some results can be
Therefore
detect any adulterated materials and
frequency of test. costly, time consuming,
difficult to interpret and
• Ease of access to raw material (e.g.
subjective.
broken tamper-proof seals are clear
evidence of an attempt to access.
• Relevant audits (i.e. those that consider
adulteration, traceability, mass balance
testing etc.
5. Simple Quadratic Model
A = Very Likely/Certain
B = Likely
C = Fairly Likely
D = Unlikely Manuka Honey
E = Very Unlikely
5. Simple Quadratic Model
1 = Very Unlikely
2 = Unlikely
3 = Fairly Likely
4 = Likely Manuka Honey
5 = Very likely/Certain
5. Simple Quadratic Model
Likelihood of occurrence
Very Likely/
Very unlikely Unlikely Fairly likely Likely Certain
(1) (2) (3) (4) (5)
Very likely/ A5
Certain A1 A2 A3 A4 A5
Likelihood of detection
(A)
Likely
B1 B2 B3 B4 B5
(B)
Fairly Likely
C1 C2 C3 C4 C5
(C)
Unlikely
D1 D2 D3 D4 D5
(D)
Very unlikely
Manuka
E1 E2 E3 E4 E5
Honey
(E)
5. Simple Quadratic Model
Risk Rating and Action Levels
Actions
Actions Actions
- Further investigation required - Action plan required to
- No immediate action to determine impact on raw
required. eliminate or reduce the
materials/packaging being
purchased and where risk to acceptable levels.
- Continued monitoring appropriate action plan put in
through Horizon scanning. place to mitigate the risk.
5. Simple Quadratic Model
of detection
occurrence
Likelihood
Likelihood
Rating
Raw Material/
Risk
Packaging Controls
of
Manuka Honey E 5 E5 • Determine if site needs to purchase Manuka
honey or would alternative be acceptable.
• Review supply chain to determine ingredient is
purchased as close to the source as possible.
• Ensure supplier approval includes assessment of
controls to prevent adulteration or substitution.
• Ensure approval includes appropriate
certification.
• Obtain Certificate of Analysis with every batch.
• Carry out periodic testing of received materials.
6. Using priority risk numbers (PRN)
Vulnerability Risk Assessment
Simple
Quadratic
Model
Profitability PRN
6. Using priority risk numbers
Occurrence (O)
Profitability (P)
detection (D)
Likelihood of
Likelihood of
(=OxDxP)
Raw material Hazard Actions
PRN
Manuka Honey Substitution 5 5 4 100
Adulteration 2 3 3 18
Rating Criteria
Low 1 – 25
Medium 26 – 50
High 51 -125
6. Using priority risk numbers
Priority Risk Numbers risk assessment action levels
Level Score Action
Low 1 – 25 - No immediate action required
- On going monitor through horizon scanning.
Medium 26 – 50 - Details reviewed and where appropriate implement
mitigation action.
- On going monitor through horizon scanning.
High 51 -125 - Determine if raw materials or packaging purchased has been
substituted or adulterated and take appropriate action e.g.
identification of material and quarantine.
- Determine if supplier of raw material/packaging needs to be
suspended and new supplier sourced.
- On going monitor through horizon scanning.
• Certificates of analysis
• Raw material testing
• Supply chain audits
• Mass balance
• Use of tamper evidence or seals
• Enhanced supplier approval
• Approved suppliers
• Alternative ingredients
• Change supplier
Mitigate risk and implement controls
Most effective
• Elimination
• Supplier Approval
• Control at Source
• Separation and
isolation
• Supervision
• Final Product Testing
• Certificate of analysis
Least effective
Verify and Review
• Your trainer will divide you into groups for this exercise and
give you a Case study of the 4 Cheese Pizza company.
• Using the Priority Risk Numbers Vulnerability Assessment
technique you are required to develop a Vulnerability
Assessment for the 4 Cheese Pizza company.
• A key part of the case study will be to apply the knowledge
you have learnt on the course.
• Your list of Raw Materials Packaging and Vulnerability Risk
Assessment needs to be documented on a Flip Chart.
Exercise 8
Case study audit