2020 Food Fraud Vulnerability Assessment Towards a Global Consensus on Procedures

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Trends in Food Science & Technology 100 (2020) 131–137

Contents lists available at ScienceDirect

Trends in Food Science & Technology


journal homepage: www.elsevier.com/locate/tifs

Food fraud vulnerability assessment: Towards a global consensus on T


procedures to manage and mitigate food fraud
Virginie Barrerea,∗, Karen Everstineb, Jérémie Théoliera, Samuel Godefroya
a
Food Risk Analysis and Regulatory Excellence Platform (PARERA), INAF, Université Laval, 2440 boulevard Hochelaga, Québec, QC, G1V0A6, Canada
b
Decernis, 1250 Connecticut Ave, NW Suite 200, Washington D.C, 20036, USA

A R T I C LE I N FO A B S T R A C T

Keywords: Background: Food fraud represents a risk to the food industry and food business operators are required to
Food fraud conduct a food fraud vulnerability assessment to be in compliance with GFSI requirements. There is currently no
Vulnerability assessment globally-recognized standardized process for food fraud mitigation and some food business operators have found
Consensus meeting the requirements to be challenging.
International food standard
Scope and approach: This work summarizes the main aspects of publicly-available food fraud vulnerability as-
sessment (FFVA) tools and resources, describes the general FFVA process based on a consensus of the previous
work, and highlights gaps in this process that should be addressed.
Key findings and conclusions: The main gaps identified were: appropriately grouping and prioritizing products/
ingredients, evaluating the vulnerability of multi-component finished products, collecting and evaluating sup-
porting data, evaluating potential public health and economic impacts, resource constraints among small/
medium-sized companies and in developing countries, understanding and creating standards for analytical de-
tection methods for fraud, and evaluating fraud vulnerability in food packaging.
This work can support discussions at a global level that may eventually lead to a consensus process for a
FFVA, for example, those conducted under the auspices of the Codex Alimentarius Commission.

1. Introduction published a position paper on mitigating the public health risk of food
fraud and required that GFSI-Recognized Certification Program Owner
Over the last decade, food fraud has been identified as an emerging (CPO) standards include a requirement for documented food fraud
risk to the food industry and a significant concern to consumers and vulnerability assessments and control plans applicable to all products.
food regulators. One estimate cited that 10% of food products could These requirements went into effect in January 2018 (Global Food
contain a fraudulent component (Everstine & Kircher, 2013). The esti- Safety Initiative: Benchmarking Requirements Document v7.1) (GFSI,
mated total economic burden is US$10–15 billion (Grocery 2014; GFSI, 2019).
Manufacturers Association, 2010). No globally accepted definition of The European Committee for Standardization (CEN) published a
food fraud exists at this point, but it is generally recognized to be an document that outlines the result of a workshop that defined concepts,
intentional act of misrepresentation of food for economic gain; it is terms and definitions related to food fraud (CEN European Committee
intended to remain undetected and misrepresents the food product to for Standardization, 2019). The International Organization for Stan-
the client or the consumer. It is worth noting that virtually all food dardization (ISO) includes a reference to food fraud in their standard
products can be subject to fraud through substitution, dilution, coun- ISO 22000 (ISO, 2018) and also has standards specific to targeted food
terfeit, diversion, enhancement, or mislabeling (Moore, Spink, & Lipp, fraud issues (such as the determination of melamine and cyanuric acid
2012). Although food fraud is generally considered to be more of an in milk (ISO, 2017)).
economic concern than a food safety concern, it can represent a real Over the past few years, other organizations have also developed
public health risk (Everstine et al., 2018; Spink & Moyer, 2011), and tools and resources to support food fraud vulnerability assessments
can have severe impacts on consumers and the industry in cases that (FFVA) and mitigation plans. These include the United States
cause illness or death. In response to the risks that food fraud re- Pharmacopeia (USP) and a collaborative effort among Safe Supply of
presents, in January 2018, the Global Food Safety Initiative (GFSI) Affordable Food Everywhere (SSAFE), PricewaterhouseCoopers (PwC),


Corresponding author.
E-mail address: virginie.barrere@fsaa.ulaval.ca (V. Barrere).

https://doi.org/10.1016/j.tifs.2020.04.002
Received 20 September 2019; Received in revised form 30 March 2020; Accepted 12 April 2020
Available online 21 April 2020
0924-2244/ © 2020 Elsevier Ltd. All rights reserved.
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

and Wageningen University. These resources generally have the aim of policy on fraud prevention and investigation (Soon et al., 2019).
reducing the risk of fraud in the food supply chain leading to an en- Comments received from Food Business Operators (FBOs) and inter-
hancement of consumer protection, compliance with regulations and national experts on food fraud prevention at conferences, training ses-
GFSI requirements, and the protection of the food company and the sions, and informal discussions have noted additional challenges with
sector. CPOs such as BRC, FSSC22000, and SQF, have developed implementation. FBOs have mentioned that the existence of multiple
documents to support the food industry in complying with the new tools makes operators (particularly those in small and medium-sized
requirements regarding food fraud (British Retail Council, 2018; companies) ask which will best enable them to meet the requirements
FSSC22000, 2019; SQF, 2018). Those documents present general of the auditor, client, or regulator. Also, there can be a tremendous
background, definitions and limited guidance for understanding food workload involved to assess all ingredients if a company has an ex-
fraud. However, the documents do not directly describe an exhaustive tensive list of raw material and suppliers. It is clear that many in the
procedure to evaluate food fraud vulnerability and develop a mitigation food industry have found implementation of a FFVA to be challenging.
plan; they often refer to other resources such as SSAFE or USP. IFS, Unlike food safety (prevention of accidental contamination with
however, did publish a guidance document to assist industry in com- foodborne pathogens or other hazards), for which guidance like HACCP
plying with the requirements which is comparable to those of SSAFE or has been available for the food industry and regulators, currently, there
USP. Various white papers and reports have also been published by is no standardized food fraud prevention process that has been globally
food industry members and industry groups, including Nestle (Nestlé, validated. HACCP measures have been incorporated into Codex
2016) and the Grocery Manufacturer Association (Grocery Alimentarius (“Codex”) standards. However, FFVA protocols currently
Manufacturers, 2010). While these are not tools or guidance docu- developed and applied by the food industry sector have not been in-
ments, these documents provide useful background information and cluded in any Codex text, such as a Code of Practice or a standard.
insights. Therefore, FFVA protocols have not benefitted from the inclusive,
One survey reported that, of 19 food manufacturers in the United transparent, collaborative and consensus-driven approach inherent in
Kingdom, 7 used an “in-house” FFVA, 5 used a private guidance Codex procedures. There is current work underway by the Codex
document, 2 used the SSAFE tool, and none used the USP tool (the IFS Committee on Food Inspection and Certification Systems (CCFICS) that
tool was not listed as a possible answer choice). The 5 remaining re- may pave the way to such development as a next step to the committee's
spondents used other strategies (e.g. product testing) (Soon, current attempts to adopt a common definition for food fraud and to
Krzyzaniak, Shuttlewood, Smith, & Jack, 2019). Four papers described identify gaps in existing Codex texts (Godefroy et al., 2020).
the application of the SSAFE tool to broad (not company-specific) Food fraud is a particular challenge to food safety stakeholders
supply chains: spices (Silvis, van Ruth, van der Fels-Klerx, & Luning, given the intentional nature of the act and the variety of (often un-
2017), organic foods (van Ruth & de Pagter-de Witte, 2020), extra anticipated) adulterants that are used (Everstine, Spink, & Kennedy,
virgin olive oil (Yan, Erasmus, Aguilera Toro, Huang, & van Ruth, 2013). Therefore, a wide range of factors and data sources need to be
2020), and the food service industry (van Ruth, van der Veeken, included in a FFVA. However, the lack of consensus on an inter-
Dekker, Luning, & Huisman, 2020). nationally recognized FFVA process results in a lack of clarity in terms
The objective of a FFVA is not to detect fraud but rather assess of how to best ensure compliance with requirements. This work aims to
vulnerabilities to fraud and, subsequently, to implement measures to present the main aspects of publicly-available FFVA tools and resources
prevent it from occurring (Spink, 2019). The term “vulnerability” dif- to date, to summarize the general FFVA process based on a consensus of
fers in meaning from the term “risk.” The U.S. Department of Homeland the previous work, and to identify gaps in the consensus process that
Security defines vulnerability as “a physical feature or operational at- should be addressed.
tribute that renders an entity open to exploitation or susceptible to a
given hazard” and defines risk as “the potential for an unwanted out- 2. Description of existing food fraud vulnerability assessment
come resulting from an incident, event, or occurrence, as determined by tools and resources
its likelihood and the associated consequences” (US Department of
Homeland Security, 2015). The difference between risk assessment and Three publicly available guidance documents and tools (USP,
vulnerability assessment is described in Manning and Soon (2019): SSAFE, and IFS) are described below in terms of format, approach,
“vulnerability is a measure of a system's susceptibility … to threat advantages, and gaps.
scenarios whereas the level of risk focuses on the consequences and
their severity should a threat be realized.” In their Food Fraud Guidance 2.1. Food Fraud Mitigation Guidance - United States Pharmacopeial
for Sites and Auditors (SQF, 2018), SQF notes that their food fraud Convention (USP)
requirements talk about “vulnerabilities” rather than “risk” because a
risk (in the context of food safety) involves “something that has oc- Format: The USP Food Fraud Mitigation Guidance (an appendix of
curred frequently before, will occur again,” and for which “there is the Food Chemicals Codex) is a 37-page guidance document available in
enough data to conduct a statistical assessment.” Vulnerability, on the .pdf format (United States Pharmacopeia, 2016).
other hand, is “a condition that could lead to an incident.” Basic approach: The guidance was developed by a USP Expert
To align with Hazard Analysis and Critical Control Points (HACCP) Panel which included representatives from industry, government, and
terminology, GFSI adopted the use of the term “VACCP” (Vulnerability academic institutions. The document describes a 4-step process to 1:
Assessment and Critical Control Points). However, many in the food assess 9 contributing factors to food fraud vulnerability, 2: assess po-
industry have noted that this acronym tends to be misleading since it tential impacts (food safety, economic, etc.), 3: characterize the overall
does not align with HACCP in its procedure and maintenance (personal vulnerability based on the previous steps, and 4: develop a mitigation
communications). Food operators have cited many challenges they face strategy. The scope of the framework focuses on fraud and mis-
with implementing a FFVA. A survey conducted in Canada in 2018 representation of food ingredients, specifically; it does not include is-
(Guntzburger et al., 2020) highlighted that only 36% of all respondents sues such as theft or counterfeiting. The 9 contributing factors to food
had implemented a vulnerability assessment in their facility, while the fraud are: supply chain; audit strategy; supplier relationship; history of
proportion for manufacturers only was 53% (Guntzburger et al., 2020). supplier regulatory, quality, or safety issues; susceptibility of quality
This survey noted some of the reasons food industry operators had not assurance methods and specifications; testing frequency; geopolitical
implemented measures to control food fraud, which included a lack of considerations; fraud history; and economic anomalies. The document
both human and financial resources. Another survey performed in the provides a framework of matrices to be used when conducting the as-
United Kingdom reported that 10 of 19 respondents had implemented a sessments. The document also describes an optional “pre-screening”

132
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

step that can be implemented for companies with a large portfolio of industry in meeting the requirements of IFS Food (Tromp & Sechet,
products or ingredients. In addressing this situation, the document re- 2018). The document presents the various phases of risk management
commends grouping the ingredients by class, or prioritizing ingredients adapted to food fraud and proposes a general step by step procedure
originating from regions where fraud has been reported. that can be adapted to the needs of a particular organization. The
Advantages: This document was written in the format of a guidance document recommends assessing two distinct aspects of vulnerability:
document, and is generally non-prescriptive with respect to the details product risks (historical incidents, economic factors, ease of fraudulent
of implementation; therefore, it allows flexibility in adapting the pro- activity, supply chain complexity, and current control measures for
cess framework to the specifics of a given organization. It provides a detection) and supplier risks (economic stability and legal status, his-
thorough discussion of food fraud vulnerabilities and provides many tory of business, commercial relationships, technical relationships,
illustrative examples based on actual occurrences of fraud. It also lists technical compliance performance, country of supply regulatory infra-
many supporting resources that can support the assessment. structure and controls, and country and business ethics). Many sources
Gaps: The lack of a corresponding tool or spreadsheet requires the of information are presented as support these assessments. The docu-
user to develop their own recordkeeping system. The process outlined ment does not prescribe one particular method of “risk assessment,” but
in the document can be time-consuming to implement, especially when does present examples of a matrix system using the likelihood of oc-
conducted on an ingredient-by-ingredient basis. Although the sugges- currence and likelihood of current detection, to enable identification of
tion to group ingredients is briefly mentioned in the optional “pre- needed mitigation or control measures. The document provides several
screening” step, further guidance on how to group ingredients and how case studies on application of the matrix to example food ingredients
to conduct an initial screening step is needed. There may be a risk of and packaging materials.
assigning group classifications in a way that does not properly represent Advantages: The format is a guidance document; therefore, it al-
the vulnerability and, therefore, potentially underrepresenting the lows flexibility in adapting implementation to the specific needs of an
fraud risk. Finally, the matrix system demonstrated in the document organization. The example matrices include a proposed scoring system,
does not include an explicit numerical scoring system, which some may which allows ranking of ingredients. The document includes illustrative
find helpful for differentiating ingredient risks. examples that demonstrate how to use the matrix system. The guide-
lines also suggest a framework for tracking the overall risk score for
2.2. SSAFE Food Fraud Tool – SSAFE, PwC, and Wageningen University each combination of raw material (or packaging material) and supplier,
the score, team decision, and control measures. This resource empha-
Format: The SSAFE tool, a collaboration among SSAFE, PwC, and sizes the importance of evaluating potential fraud in food packaging
Wageningen University, is an online assessment accessible after regis- materials.
tration (van Ruth, Huisman, & Luning, 2017). The format consists of a Gaps: The demonstrated matrix system uses a combination of in-
series of questions followed by both a visual and narrative output of the gredient and supplier risk factors. Therefore, the process may be cum-
results. bersome for organizations with a large portfolio of ingredients and
Basic approach: This tool indicates that users can conduct an suppliers. This process does not explicitly include economic or con-
analysis based on ingredients, products, or product groups (referred to sumer health impacts in the evaluation. Finally, there is no discussion of
as “objects” within the tool). The user is asked to perform an impact whether or how to group ingredients to reduce the workload for com-
analysis (based on safety risks, economic value, and brand image) to panies with a large portfolio of ingredients.
select which objects to prioritize. For each object, the operator answers
a set of 50 questions based on criminology concepts: motivation, op-
portunity, and control (Cohen & Felson, 1979). The user is also 3. Consensus of procedures for implementing a food fraud
prompted to indicate the degree of certainty in each response. The vulnerability assessment
output of the assessment is numerical with corresponding plots on
spider charts, with the goal of helping to visually identify areas where The following discussion aims to leverage this review of currently
action or focus may be warranted for mitigation measures. available FFVA approaches, presented above, towards the identification
Advantages: Creation of this tool was supported by the GFSI Board of areas of consensus among them. This summary of areas of consensus
and this tool is directly cited in many of the GFSI CPO guidance can offer a possible starting point for multi-stakeholder processes or-
documents. The use of an online, interactive tool that is more pre- ganized at the international level (possibly within Codex or other or-
scriptive than a guidance document may be advantageous for some ganizations) as recommended by recent multi-stakeholder discussions
users. The questions often involve a scenario-based approach and in- (Godefroy et al., 2020).
clude links to supporting sources for information. The assessment can Although the three resources described above outline different
be completed individually, or a user can assign sections to other col- concepts and procedures for implementing a FFVA, there are common
leagues to complete as part of an overall joint assessment. themes among all of them. The basic procedure for conducting an as-
Gaps: The question and answer format are less adaptable than a sessment consists of the following steps:
guidance document. The assessment process can be long and laborious
to be implemented, which can be a hindrance for operators with a 1. Gather the team that will be responsible for conducting the assess-
broad portfolio of ingredients and products. As above, additional gui- ment and developing mitigation strategies
dance on how to implement appropriate grouping of ingredients or 2. Gather all relevant information to be used in the assessment (in-
products into “product groups” is warranted. This food fraud tool does gredients, products, packaging materials, suppliers, etc.) and im-
not explicitly include an impact assessment or guidance on mitigation plementing grouping, if applicable
strategies. 3. Conduct a vulnerability assessment
4. Develop and implement a mitigation plan
2.3. IFS Standards Product Fraud-Guidelines for Implementation - 5. Routinely monitor, review, and refine the vulnerability assessment
International Featured Standards (IFS) Food and mitigation plan

Format: The IFS Standards Product Fraud – Guidelines for Each step is discussed in more detail below.
Implementation is a 52-page guidance document available in.pdf
format (Tromp & Sechet, 2018).
Basic Approach: This is a guidance document published to support

133
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

3.1. Gather the team that will be responsible for conducting the assessment depending on the specifics of the ingredient and supply chain, but may
and developing mitigation strategies generally include measures such as targeted laboratory testing, supplier
auditing, or changing ingredient suppliers.
There is general consensus that the team responsible for conducting
vulnerability assessments and implementing a mitigation plan should
3.5. Routinely monitor, review, and refine the vulnerability assessment and
be multi-disciplinary. If applicable, the board of directors may take a
mitigation plan
leading role and assist the team with providing information and en-
suring this process if part of the long-term vision of the company. The
The FFVA should be routinely reviewed and updated as needed. Due
food safety and quality assurance departments will likely play critical
to the nature of food fraud vulnerabilities, this may need to take place
roles as they manage food safety risks and oversee quality assurance
more often than a HACCP plan review, for example. Situations that
specifications. Two other important departments may be purchasing
should prompt a review of the FFVA and mitigation plan may include
and research and development, since they are responsible for procuring
the development of a new product or claim on a product, sourcing a
raw materials and developing and managing recipes.
new ingredient, geographic-specific economic or political factors, or
market intelligence.
3.2. Gather all relevant information to be used in the assessment
(ingredients, products, packaging materials, suppliers, etc.) and
implementing grouping, if applicable 4. Limitations in food fraud mitigations

Information to compile could include a description of each material Although there are tools and resources available for conducting
including the name, the supplier or distributor, the composition, the FFVAs, this is an emerging field and there remain some general areas
specifications, and the products in which it is used. If a company also where additional guidance and development of collective leadership at
plans to track finished products, recordkeeping may include the names the international level is warranted.
and contents of all the finished products, the clients they are shipped to,
and other relevant information for tracking. Both the USP Food Fraud
4.1. Appropriately grouping and prioritizing products/ingredients
Mitigation Guidance and the SSAFE tool recommend the option of
grouping ingredients or materials, and conducting the vulnerability
Although grouping products/ingredients is mentioned as one pos-
assessment at the group level, as a way to reduce the workload for
sible solution to reduce the time and resources needed for a FFVA, a
organizations with a large portfolio of raw materials. As noted above,
range of possible options is presented without clear guidance on what is
USP recommends grouping by “class” (oils, spices, dairy ingredients,
the most effective from a risk assessment perspective. The resources we
etc.). SSAFE notes that users may want to conduct an analysis based on
reviewed indicated that ingredients can be grouped by class, by vul-
“product groups,” but does not indicate how these groups may be
nerability, by supplier or wholesaler, or by country of origin. Final
formed.
products can be grouped by client, transporter and wholesaler, or
country of destination. The grouping and prioritization will likely de-
3.3. Conduct a vulnerability assessment
pend on the products/ingredients, the supply chain structure, and the
priorities of the team conducting the assessment. Spink, Moyer, and
The resources outlined above differ with respect to the details of the
Speier-Pero (2016) proposed a basic matrix based on market/region vs.
approach to a vulnerability assessment. However, although the ap-
product/group that may be used as an “initial screen.” However, even
proaches appear different, they generally result in an overall evaluation
in this example, there is quite a bit of room for interpretation in terms of
of similar factors that can contribute to fraud vulnerabilities. The
what constitutes a product “group” and what classifies as a market/
criminology concepts referenced by SSAFE (opportunities, motivations,
region. For example, does it make sense to group all dairy products
and lack of control) are inherent in the factors suggested by both USP
together? Or might it be more logical (from a potential risk perspective)
and IFS (such as economic factors or the effectiveness of analytical
to group powdered products sourced internationally separately from
testing programs in place).
liquid milk sourced domestically?
Food safety issues should be the priority of the team implementing a
vulnerability assessment. Part of the assessment should include an
evaluation of the potential public health impacts. In addition, the as- 4.2. Evaluating the vulnerability of multi-component finished products
sessment may include an evaluation of potential economic impacts.
Fig. 1 is an example of how the frameworks described in each re- FFVA tools are mainly designed for evaluating incoming ingredients
source relate to each other. The general consensus is to consider a range and products. However, GFSI requires an evaluation of the potential for
of factors that could drive food fraud motivation, opportunity, and lack fraud in final products. Therefore, assessing the ethics and the economic
of (gaps in) controls and to document the evaluation of those factors. and legal status of the clients, the transporters, and the intermediaries
The question of whether the approach stems from the perspective of within the entire supply chain should be performed as part of a FFVA.
criminology concepts or the contributing factors that underlie fraud can However, it remains unclear to what extent upstream suppliers may be
be left to the discretion of the team conducting the assessment. held responsible for downstream fraud acts, and to what extent up-
stream suppliers have the ability to mitigate against fraud that occurs
3.4. Develop and implement a mitigation plan downstream of their direct control. It would be challenging for one
entity to fully control the fraud risks in both the upstream and down-
Once the potential vulnerabilities are identified, a mitigation plan stream supply chain. Fraud risks in a given ingredient are generally
should be implemented to prevent and control the risks of fraudulent better controlled earlier in the supply chain and before inclusion in a
ingredients or products progressing through the supply chain and into multi-component food product. A holistic supply chain program will
final products. rely on contributions from all parties in the supply chain, with re-
As noted above, existing food fraud controls may be documented as sponsibility on any one entity to evaluate their direct suppliers and
part of the vulnerability assessment or, in some cases (such as under the customers in addition to any relevant intermediates (wholesalers or
IFS framework), existing controls may be documented as part of the transporters). However, the company could document potential gaps
mitigation plan. In situations where additional controls are warranted, and corresponding controls within the upstream and downstream
the team should identify those measures. Control measures will vary supply chain beyond their direct suppliers and clients.

134
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

Fig. 1. Overview of food fraud vulnerability assessment process as described in three resources: SSAFE, USP, and IFS.

4.3. Collecting and evaluating supporting data seafood identification is the FISH-BOL database (Hanner, Becker,
Ivanova, & Steinke, 2011). However, many of the databases developed
Each resource reviewed here cites various sources of information based on nuclear magnetic resonance (NMR) testing are privately-held.
that can support FFVAs, including databases of food fraud-relevant There has been much discussion at meetings with international experts
information. There are generally two types of food fraud-relevant da- on food fraud about the creation of such databases as public goods, to
tabases: databases of records (such as incidents, occurrences, or noti- be made accessible to all partners and stakeholders. This effort could be
fications) and databases of reference information specific to a food supported by international organizations such as FAO, GFSI, and gov-
commodity (such as compositional databases or spectral databases ernments. The resulting databases would be viewed as accepted and
based on authentic materials). validated source of information to support FFVAs and laboratory
Food fraud record databases may be used to support the evaluation testing. This effort would not be successful unless it was widely sup-
of historic incidents of fraud or notification of regulatory action. ported by all stakeholders, willing to supply a wide range of food fraud-
Manning and Soon (2019) have presented an extensive description of relevant data from existing databases, laboratories, food industries, and
these databases. Record databases have several limitations and should governments and their associated testing and surveillance programs.
be used in conjunction with an evaluation of the other required factors
in a FFVA. Record databases generally reflect what has been reported 4.4. Evaluating potential public health and economic impacts
and, therefore, underrepresent food fraud risk in new ingredients or
those that have not risen to researchers’ or regulators’ interest. Most Both the USP guidance and the SSAFE tool specifically indicate that
existing record databases require a subscription fee, which could re- the potential health impact of food fraud on consumers should be ad-
present a non-negligible cost for a small or medium-sized business. dressed when undertaking a FFVA. However, anticipating potential
(Currently, there are not regulatory or GFSI requirements to access food safety impacts resulting from food fraud can be challenging. There
these subscription-based databases). are many different contaminants (biological, chemical, physical) that
Compositional databases, on the other hand, can be both generated could be introduced in an ingredient at various points in the supply
by and used to support laboratory testing and authentication of food chain, some of which may not be anticipated based on the information
ingredients or products. They can be particularly useful for products found in databases, experience, or other research. Economic impacts to
such as honey and olive oil that can vary widely in their constituents a company or other stakeholders can be assessed in term of money
and flavor profiles and benefit from source-based marketing. These (recall, sales decrease, or legal fees) and reputation (consumer trust).
databases compile a wide range of representative samples that can be Although some of the resources recommend that these potential im-
used to determine whether a new sample fits within that range or is pacts be assessed, either at the beginning of a FFVA to determine
outside of it (and, therefore, may contain a fraudulent component). One priorities or as part of the overall assessment, there remains the op-
publicly-available DNA-based database that has been widely used for portunity for further development of targeted guidance for effectively

135
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

evaluating the impacts of food fraud, especially in the area of consumer fully implementing a FFVA. This paper aimed at describing what has
health. been developed to date in the public arena, identifying and discussing
areas of consensus, and documenting the gaps that still exist in the
4.5. Resource constraints at small/medium-sized companies and in FFVA process. The goal of this publication was to compile and sum-
developing countries marize this information in support of possible future multi-stakeholder
discussions about the development and validation of an internationally-
Although food fraud requirements have been in place for a few recognized FFVA process by organizations such as FAO or the Codex
years, it is still a relatively new area of focus and some companies are Alimentarius Commission.
still coming up to speed. A lack of training in food fraud prevention and Development of an internationally-recognized process would enable
fraud detection methods represents a real impediment to FFVA im- the food safety community to rely on a validated process, similar to
plementation and success. However, this training could represent a HACCP that was adopted as a reference for food safety prevention by
considerable cost for small and medium companies. Universities have a the Codex Alimentarius Commission. However, given that food fraud
critical role to play in disseminating food fraud training; Michigan State prevention is substantially different from prevention of process-based
University created a freely-accessible Massive Online Open Course chemical or microbial contamination, guidance on a FFVA approach
(MOOC) to provide tools and information on food fraud management should most likely be kept separate from HACCP guidance and the two
(Michigan State University, 2019). Another potential impediment is a systems be implemented in parallel.
lack of translation of resources into languages other than English. The Development of a globally-recognized vulnerability assessment ap-
SSAFE tool is currently available in 11 languages and the USP Guidance proach would support food regulators in their efforts to offer guidance
is available in Mandarin, but some resources are only currently avail- to the regulated sector, should their regulatory policy around fraud
able in English. Implementation of a FFVA process throughout the evolve towards mandating such measures. However, successful devel-
global food industry is a long-term challenge. Consideration of resource opment of a flexible and adaptable approach would also be dependent
constraints and language barriers should be taken in account if a global upon active participation by food industry groups.
guidance is developed. Food fraud management should be considered a non-competitive
issue and will require pooling resources, enhanced information and
4.6. Understanding and creating standards for analytical detection methods data sharing strategies, and global partnership efforts to develop miti-
for fraud gation measures that are truly proactive.

Analytical detection methods are one tool that can be used to both Declaration of competing interest
detect and deter fraud; however, results from a food industry survey
(Guntzburger et al., 2020) indicated that many in the food industry do None.
not actively apply nor understand these methods. There are a wide
range of methods which usually need to be tailored to a particular food References
matrix and adulterant (or set of adulterants). Non-targeted methods are
evolving and show much promise for detecting a wide range of possible British Retail Council (2018). Global standard food safety issue 8. Available at: https://
adulterants and serving as “screening” methods. Many food companies www.brcgs.com/, Accessed date: 20 September 2019.
outsource ingredient testing (for quality assurance, safety, and fraud) to CEN (European Committee for Standardization) (2019). Authenticity and fraud in the
feed and food chain – concepts, terms, and definitions. Standard Norge SN-CWA
third party laboratories that use proprietary methods. One of the big 17369:2019.
challenges in this area is that there are very few detection methods that Cohen, L. E., & Felson, M. (1979). Social routine and crime rate trends: A routine activity
have been globally validated for food fraud detection. AOAC has re- approach. American Sociological Review, 44, 588–608.
Everstine, K., Abt, E., McColl, D., Popping, B., Morrison-Rowe, S., Lane, R. W., et al.
cently followed up on its Presidential Taskforce on Food Fraud with an (2018). Development of a hazard classification scheme for substances used in the
ongoing program that aims to define the standards that a food fraud- fraudulent adulteration of foods. Journal of Food Protection, 81(1), 31–36.
focused detection method should fulfill to be validated. Everstine, K., & Kircher, A. (2013). Estimated by the food standards agency of the U.K, as
reported by, “the implications of food fraud,”. Food Quality & Safety magazine(June/
July 2013).
4.7. Evaluating fraud vulnerability in food packaging Everstine, K., Spink, J., & Kennedy, S. (2013). Economically motivated adulteration
(EMA) of food: Common characteristics of EMA incidents. Journal of Food Protection,
4, 560–735.
Food packaging can be subject to fraud, and assessing and miti-
FSSC22000 (2019). Guidance document: Food fraud mitigation. Available at: https://
gating the risk of packaging fraud is also a GFSI requirement. Several www.fssc22000.com/wp-content/uploads/19.0528-Guidance_Food-Fraud-
types of packaging fraud could occur, including misrepresentation of Mitigation_Version-5.pdf, Accessed date: 28 March 2020.
grades, composition, functionality (such as gas controlled), claims (such GFSI (2014). GFSI position on mitigating the public health risk of food fraud. Available at:
https://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.
as food-grade), or the undeclared presence of contaminants (such as pdf, Accessed date: 20 September 2019.
allergens). The IFS guidance specifically addresses packaging fraud. GFSI (2019). What is GFSI. Accessed on December, 2018 https://www.mygfsi.com/
However, the teams responsible for overseeing food safety and quality about-us/about-gfsi/what-is-gfsi.html, Accessed date: 20 September 2019.
Godefroy, S., Barrere, V., Théolier, J., Baker, R. C., Zhang, G., Hamilton, M., et al. (2020).
often do not overlap with those that have expertise in food packaging. Summary of the AOAC-Sponsored workshop series related to the global under-
In addition, food fraud record databases often lack information on food standing of food fraud (GUFF): Mobilization of resources for food authenticity as-
packaging fraud. Research into understanding and providing guidance surance and food fraud prevention and mitigation. Journal of AOAC International,
103(2), 470–479. https://doi.org/10.1093/jaoacint/qsz035.
in the area of fraud in food packaging materials should be further de- Grocery Manufacturers Association (2010). Consumer product fraud, deterrence and
veloped to better support consumer safety and compliance with GFSI detection. Available at: http://www.gmaonline.org/downloads/wygwam/
requirements. consumerproductfraud.pdf, Accessed date: 20 September 2019.
Guntzburger, Y., Théolier, J., Barrere, V., Peignier, I., Godefroy, S., & De Marcellis-Warin,
N. (2020). Food industry perceptions and actions towards food fraud: Insights from a
5. Conclusions pan Canadian study. Food Control, 113, 107182.
Hanner, R., Becker, S., Ivanova, N. V., & Steinke, D. (2011). FISH-BOL and seafood
identification: Geographically dispersed case studies reveal systemic market sub-
Food fraud vulnerability assessment tools and resources have been
stitution across Canada. Mitochondrial DNA, (Suppl 1), 106–122.
developed to assist FBOs and other stakeholders in conducting assess- ISO (2017). ISO and Food-Great things happen when the world agrees. https://www.iso.
ments. However, various factors have limited certain FBOs (particularly org/files/live/sites/isoorg/files/store/en/PUB100297.pdf, Accessed date: 11 March
small- and medium-sized enterprises) in their ability to effectively un- 2020.
ISO (2018). ISO 22000 Food Safety Management. Systems – requirements for any organization
derstand what is required from them for food fraud prevention and in

136
V. Barrere, et al. Trends in Food Science & Technology 100 (2020) 131–137

in the food chain (2nd ed.). . to address ‘how to start?’ and ‘how much is enough?’. Current opinion in Food Science,
Manning, L., & Soon, J. M. (2019). Food fraud vulnerability assessment: Reliable data 27, 130–138.
sources and effective assessment approaches. Trends in Food Science & Technology, 91, Spink, J., & Moyer, D. C. (2011). Defining the public health threat of food fraud. Journal
159–168. of Food Science, 76, R157–R163.
Michigan State University (2019). Food fraud Initiative-MOOCs for food fraud. Available Spink, J., Moyer, D. C., & Speier-Pero, C. (2016). Introducing the food fraud initial
at: https://foodfraud.msu.edu/mooc/, Accessed date: 20 September 2019. screening model (FFIS). Food Control, 69, 306–314.
Moore, J. C., Spink, J., & Lipp, M. (2012). Development and application of a database of SQF (2018). Food fraud guidance document for Sites and auditors. Available at: https://
food ingredient fraud and economically motivated adulteration from 1980 to 2010. www.sqfi.com/wp-content/uploads/2018/08/Food-Fraud-Guidance-for-Sites-and-
Journal of Food Science, 77(4), R118–R126. Auditors-2.pdf, Accessed date: 20 September 2019.
Nestlé (2016). Food fraud prevention - economically-motivated adulteration. Available Tromp, S., & Sechet, B. (2018). IFS standards product fraud. Guidelines for implementation.
at: https://www.nestle.com/sites/default/files/asset-library/documents/library/ International Featured Standards. Available at: https://www.ifs-certification.com/
documents/suppliers/food-fraud-prevention.pdf, Accessed date: 20 September 2019. images/standards/ifs_food6/documents/FoodFraud-Guide_1805.pdf, Accessed date:
van Ruth, S. M., & de Pagter-de Witte, L. (2020). Integrity of organic foods and their 20 September 2019.
suppliers: Fraud vulnerability across chains. Foods, 9, 188. United States Pharmacopeia (2016). Food fraud mitigation Guidance-Appendix XVII
van Ruth, S. M., Huisman, W., & Luning, P. A. (2017). Food fraud vulnerability and its key General tests and assays. Available at: https://www.usp.org/sites/default/files/usp/
factors. Trends in Food Science & Technology, 67, 70–75. document/our-work/Foods/food-fraud-mitigation-guidance.pdf, Accessed date: 20
van Ruth, S. M., van der Veeken, J., Dekker, P., Luning, P. A., & Huisman, W. (2020). September 2019.
Feeding fiction: Fraud vulnerability in the food service industry. Food Research US Department of Homeland Security (2015). National critical infrastructure security and
International109158. resilience research and development plan. Available at: https://www.dhs.gov/sites/
Silvis, I. C. J., van Ruth, S. M., van der Fels-Klerx, H. J., & Luning, P. A. (2017). default/files/publications/National%20CISR%20R%26D%20Plan_Nov%202015.pdf,
Assessment of food fraud vulnerability in the spices chain: An explorative study. Food Accessed date: 20 September 2019.
Control, 81, 80–87. Yan, J., Erasmus, S. W., Aguilera Toro, M., Huang, H., & van Ruth, S. M. (2020). Food
Soon, J. M., Krzyzaniak, S. C., Shuttlewood, Z., Smith, M., & Jack, L. (2019). Food fraud fraud: Assessing fraud vulnerability in the extra virgin olive oil supply chain. Food
vulnerability assessment tools used in food industry. Food Control, 101, 225–232. Control, 111, 107081.
Spink, J. (2019). The current state of food fraud prevention: Overview and requirements

137

You might also like