Guida de Food Defense

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Food Defense and Biosecurity

Elements and Guidelines for a Defense Plan


In recent years, biosecurity and bioterror- The goal of governmental agencies,
ism awareness in the industry has become such as the Food and Drug
more critical. Since the attacks of Administration (FDA), the Centers for
September 11, 2001, terrorists are becom- Disease Control and Prevention (CDC),
ing more creative in their attack methods and the U.S. Department of Agriculture
and targets. (USDA), is to ensure the food industry is
Due to the complacency of businesses, prepared for such attacks by outlining
especially in the food industry, many potential risk areas. In particular, the
believe such attacks are possible if compa- USDA Food Safety and Inspection Service
nies do not reevaluate their biosecurity (FSIS) and FDA have developed surveys,
defense. Threats to the system can occur in strategies, and guidelines that outline, in
a number of ways: biological, physical, detail, potential vulnerabilities within a
radiological/chemical, or nuclear. Food food company’s infrastructure.
defense plans are essential to protect the A food defense plan needs to be effi-
food supply from intentional threats, cient and functional. Most companies
which may lead to serious outcomes. have implemented a Hazard Analysis
The agriculture and food industries and Critical Control Points (HACCP)
operate in a global market, so a successful plan to ensure the production of safe
terrorist act would be felt around the food. But a food defense plan is one that
world. Food and water sources are a con- evaluates all of a plant’s security points:
cern because they are a means by which a personnel, incoming ingredients and sup-
very small amount of a causative agent plies procedure, transportation, process-
can affect large numbers of people. ing, and product tracking. Most of a
Not only is international terrorism a plant’s security measures are common
concern, but one disgruntled employee sense but often overlooked.
could harm or even kill consumers and
result in a company’s bankruptcy.
Areas to Evaluate • Computer system
Following is a list of some of the areas to evaluate - Firewalls
when making a food defense plan. Some examples of - Backup system
how to ensure security in each area also are provided. - Password-protected computer entry
• Personnel (internal and/or external) - Activity monitoring
- Background checks (employees, contractors, • Storage security
temporary workers) - Restricted access to product and material
- Security training storage areas
- Controlled access - Inventory of ingredients
- Identification - Inventory of restricted ingredients (checked
- Restrictions to access areas and monitored frequently and compared to
• Outside security production volume)
- Secured grounds (perimeter fencing) - Inventory of hazardous chemicals (periodic and
- Enough lighting for proper monitoring systematic)
- Emergency exits that are self-locking and/or set - Procedures for storage and disposal of chemicals
with alarms • Shipping and receiving
- Working locks on outside doors, windows, - Inspection of trailers
gates, roof openings, storage tanks, vents, - Check on trailer’s seals and locks (inbound and
trucks, rail cars, etc. outbound)
- Guard entrance - Monitoring and testing of incoming ingredients
- Employee identification for access to the grounds - Records of inspections
• Inside security - Usage of tamper-evident seals on trucks and
- Emergency lighting products
- Security cameras - Check deliveries of all materials
- Restricted access areas (cleared employee - Notification of deliveries
accompaniment of all non-approved personnel) - Proper authority notification when abnormali-
- Updated facility layout to local law enforce- ties exist
ment agencies - Returned goods policies and procedures
- Regular inventory of employee issued keys • Water and ice supply
- Procedures for checking suspicious packages, - Restricted access to the water supply (espe-
lockers, closets, storage areas, maintenance areas cially wells)
- Visitor policy (access, identification, accompa- - Restricted access to ice machines
niment by a responsible employee, exit - Restricted access to storage tanks
accountability) - Monitor water line integrity
- Restricted access for: - Prompt communication with local health offi-
1. HVAC systems cials if there is any suspected compromise of
2. Ventilation ducts public water potability
3. Water systems • Mail handling
4. Electricity - Separate facility and/or room away from food
5. Disinfection systems (tanks, supplies, areas
hoses, etc.) - Training for handlers of mail (suspicious packages)
6. CIP systems - If handled by an outside agency, knowledge of
7. Other closed systems that agency’s security procedures
8. Lab areas (chemicals, reagents, disposal • Security throughout the line
procedures) - Knowledge of suppliers’ defense plans
9. Chemical storage areas (cleaning com- - Reliability of suppliers
pounds, refrigerant, etc.) - Certificates of analysis on incoming raw materials
10. Restricted ingredients storage areas - Adequate tracking system of products
(secured/limited access) • Emergency preparedness
• Slaughter and processing areas - Contacts in the event of an emergency
- Holding pens - Evacuation routes
- Flow line integrity - Recall plan
- Incoming ingredient and packaging integrity
- Trace back records (COOL, lot numbers, affi-
davits, animal ID)
- Trace forward records (recalls and procedures)
Elements of a Functional Food Defense Plan For More Information
• Develop a functional food defense plan based on http://www.usda.gov/wps/portal/!ut/p/_s.7_0_A/7
the vulnerabilities revealed during the evaluation. _0_1OB?navid=FOOD_SECURITY&parentnav=FOOD
• Implement the food defense plan by using the _NUTRITION&navtype=RT
defense measures identified.
• Test the written plan by periodically monitoring http://www.fsis.usda.gov/pdf/Elements_of_a_Food_
the effectiveness of the defense measures. For Defense_Plan.pdf
example:
- Make unannounced entrances at random http://www.fsis.usda.gov/Food_Defense_&_Emergen
perimeter checkpoints cy_Response/Guidance_Materials/index.asp
- Check plant employee ID badges
- Check locks on doors, storage areas, bulk tanks, http://www.fsis.usda.gov/News_&_Events/Food_Saf
water/ice supplies, windows, offices, one-way ety_Inspection_Podcasts/index.asp
exit doors, etc.
- Perform a mock recall
- Test lab or storeroom inventory procedures
- Test security cameras in strategic locations
• Assess the food defense plan periodically, especial-
ly if new risk areas are discovered, to ensure the
security of the establishment. Do this at least year-
ly or when changes occur in the plant, similar to
HACCP plan reviews.
• Maintain the plans to ensure that defense meas-
ures are being implemented and are effective.
Copyright 2010 by Mississippi State University. All rights reserved. This publication may be copied and distributed
without alteration for nonprofit educational purposes provided that credit is given to the Mississippi State University
Extension Service.

By J. Byron Williams, Ph.D., PAS, Assistant Extension/Research Professor, Food Science, Nutrition, and Health
Promotion, and Courtney A. Crist, undergraduate research laboratory assistant.

Discrimination based upon race, color, religion, sex, national origin, age, disability, or veteran’s status is a viola-
tion of federal and state law and MSU policy and will not be tolerated. Discrimination based upon sexual orien-
tation or group affiliation is a violation of MSU policy and will not be tolerated.

Publication 2593
Extension Service of Mississippi State University, cooperating with U.S. Department of Agriculture. Published in
furtherance of Acts of Congress, May 8 and June 30, 1914. MELISSA J. MIXON, Interim Director (POD-01-10)

You might also like