Professional Documents
Culture Documents
Conduct Key Activity Mapping To Identify Apss (Continued)
Conduct Key Activity Mapping To Identify Apss (Continued)
Conduct Key Activity Mapping To Identify Apss (Continued)
Module 4: Using the Key A ctivity Type Method Page VAR(p) of VAR(np)
N
IO
(..___ _
►
B_
ac_
k _
RS
___,)
00:00100:00 •MIi
( _____
N_ex_t _
I
___,)
VE
Module 4: Using the Key A ctivity Type Method Page VAR(p) of VAR(np)
1111 I I CC
(..___ _B_
ac_
k _ ___,) (..___ _N_ex_t _ ___,)
N
IO
(___
►
B_
ac_
k _
RS
___.)
00: 00100: 00 •MIi
( _ _ _N_ex_t _
I
__,,,)
VE
This concludes the instructional portion of this training course. Lets summarize what
you've learned today:
PU
• The KAT method is an acceptable method of conducting your fac ility's VA.
• The KAT method simplifies the VA process and is less intensive with respect to time,
resources , and technical expertise.
• The fou r KATs and their characteristics .
• The recommended preliminary steps that will help make your VA using the KAT
method streamlined and efficient.
• How to identify APSs by recognizing which process steps in your food operation align
with the KATS .
• How to explain your decisions of what is and what is not an APS in the context of the
KAT method .
► 00:00100:00 ••·~II I
(___B_
ac_
k _ ___.) ( ___N_ex_t _ ___.)
This training course is targeted towards food professionals using FDA's Key Activity Type , or KAT, method to
conduct their facility's vulnerability assessment, or VA. The VA is a required part of the facility's food defense
plan mandated under FDA's Mitigation Strategies to Protect Food Against Intentional Adulteration , or IA rule. By
successfully completing this course , the learner will have satisfied the training requirement to conduct the
vulnerability assessment using the KAT method .
N
IO
RS
VE
Exit
IC
Please note that this course satisfies the training requirement to conduct a vulnerability assessment using the
KAT method ONLY. Any deviation from the KAT method described in this course will necessitate that the
individual take a vulnerability assessment training recognized as adequate by the FDA, or be otherwise qualified
PU
through job experience to conduct a vulnerability assessment using another vulnerability assessment
methodology. See the Resources tab for information about other available trainings .
This course is divided into four modules , which will cover: an overview of food defense and the Intentional
Adulteration rule , an introduction to using the key activity type method as a way to conduct your vulnerability
assessment, getting prepared to use the key activity type method , and finally , putting the key activity type
method into practice .
N
IO
RS
VE
Exit
IC
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
Welcome to Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
N
7. Explain the training and qualifications requ ired to conduct vulnerability assessments.
IO
RS
VE
Exit
IC
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
Intentional adulteration is the deliberate contamination of food with a biological, chemical , radiolog ical , or
phys ical agent by an individual or group of individuals with the intent to cause wide scale public health harm . It is
a crim inal act that can have devastating results. Therefore, Congress mandated that FDA publish regulations
PU
setting forth requirements to protect the public from intentional adulteration of food . FDA has issued a final
regulation , Mitigation Strategies to Protect Food Against Intentional Adulteration (21 CFR Part 121), which
requ ires covered facilities to identify and protect the ir most vulnerable points aga inst intentional adulteration . To
keep things simple , this will be referred to as the IA rule.
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
Food defense is the effort to protect food from intentional acts of adulteration intended to cause wide scale
public health harm. These efforts include measures taken to reduce or el iminate the possibility that an intentional
adulteration event would occu r. There are many measures that can be implemented fo r food defense purposes
but one of the most important is a food defense plan . The IA rule requires cove red fac ilities to develop and
implement a food defense plan that identifies and implements add itional food defense measures at the most
vulnerable po ints with in thei r fac ilities . We'll talk more about the requirements of the IA rule in later slides .
N
IO
RS
VE
Exit
IC
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
Intentional adulteration of the food supply can result in wide scale public health harm including severe illness and
death . In add ition to illnesses and deaths , potential impacts include public loss of confidence in the food supply,
damage to a company's reputation , and job losses , among others . Malicious individuals , includ ing terrorists , may
PU
see th is as an opportunity to harm the public and furthe r their cause. Ha rd as it is to imag ine , intentional
adulteration has already occu rred . In December 2013, there were at least 2,843 mild foodborne illnesses
reported and 6.4 million packages of various frozen foods recalled because a contract employee at a food
fac ility intentionally adulterated several frozen foods with a pesticide. Th is example illustrates why food defense
plans are so important-they aim to prevent these potentially devastating events .
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
The IA rule aims to prevent or significantly minimize intentional acts of food adulteration , including acts of terrorism ,
intended to cause wide scale public health harm . This is accompl ished by requiring that covered facilities develop and
implement a food defense plan that includes a vulnerability assessment to identify actionable process steps , or APSs ,
identification and implementation of mitigation strategies at those actionable process steps , and mitigation strategy
management components (food defense monitoring , food defense corrective actions , and food defense verification).
Reanalysis of the food defense plan is also required under certain cond itions . The IA rule also has records and training
requirements .
This training focuses on the first food defense plan component-a vulnerability assessment to identify actionable process
steps . Spec ifically , it covers one possible approach to conducting a vulnerability assessment: the key activity type method .
N
IO
RS
VE
Exit
IC
Module 1: Food Defense Overview and Introduction to the Intentional Adulteration Final Rule
For more detailed information about the rule and its requirements , please vis it the following resources: The IA
rule link will take you to the full text of the regulation , and the FDA IA rule Fact Sheet provides a brief summary of
the rule's provisions , coverage , and exemptions.
PU
Additionally, the Food Safety Preventive Controls Alliance has developed an online course that provides on
overview of the IA rule requirements.