Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 SECURITY OF OUR FOOD SUPPLY 2202 Steven C Seideman Extension Food Processing Specialist Cooperative Extension Service University of Arkansas.

Similar presentations


Presentation on theme: "1 SECURITY OF OUR FOOD SUPPLY 2202 Steven C Seideman Extension Food Processing Specialist Cooperative Extension Service University of Arkansas."— Presentation transcript:

1 1 SECURITY OF OUR FOOD SUPPLY 2202 Steven C Seideman Extension Food Processing Specialist Cooperative Extension Service University of Arkansas

2 2 Photo courtesy of USDA

3 3

4 4

5 5 SECURITY OF OUR FOOD SUPPLY The security of our food supply is of paramount importance. The security of our food supply is of paramount importance. This instructional series deals with tampering or other malicious, criminal or terrorists actions to our food supply. This instructional series deals with tampering or other malicious, criminal or terrorists actions to our food supply. For the purpose of brevity, lets consider these as acts of terrorism and that terrorism refers to acts by persons or organizations of either national or international origins. For the purpose of brevity, lets consider these as acts of terrorism and that terrorism refers to acts by persons or organizations of either national or international origins.

6 6 Demographics of Food Prior to and during the great depression, 95% of Americans lived on farms and could raise their own food. Prior to and during the great depression, 95% of Americans lived on farms and could raise their own food. Now, less than 1% of the population lives on farms. This means that 99% of Americans depend on agriculture and food manufacturers and distributors for their food supply Now, less than 1% of the population lives on farms. This means that 99% of Americans depend on agriculture and food manufacturers and distributors for their food supply

7 7 Photo courtesy of USDA

8 8

9 9 Trust Not only do Americans depend on rural agriculture, food manufacturers and distributors for their food supply but they trust that it will be safe, nutritious, abundant and an economical value. Not only do Americans depend on rural agriculture, food manufacturers and distributors for their food supply but they trust that it will be safe, nutritious, abundant and an economical value. Since the vast majority of Americans are dependent of our food supply, it makes our food supply an excellent target for certain groups to promote their agenda by terrorism. Since the vast majority of Americans are dependent of our food supply, it makes our food supply an excellent target for certain groups to promote their agenda by terrorism.

10 10 Terrorism Defined as The use of terror, violence and intimidation to achieve an end. Defined as The use of terror, violence and intimidation to achieve an end. There are certain groups both domestic and international who believe so strongly in their cause that they use unscrupulous methods to instill fear in their opponents making them more agreeable to their way of thinking. There are certain groups both domestic and international who believe so strongly in their cause that they use unscrupulous methods to instill fear in their opponents making them more agreeable to their way of thinking.

11 11 Why Bioterrorism? The use of biological agents on humans, livestock and plants to instill terror in their opponents is not new. The use of biological agents on humans, livestock and plants to instill terror in their opponents is not new. Most discussions on terrorism to date have centered on humans but using livestock and plants and the food produced from them is not only possible but has been used in the past. Most discussions on terrorism to date have centered on humans but using livestock and plants and the food produced from them is not only possible but has been used in the past. Bioterrorism has been referred to as the poor mans nuclear arsenal. Bioterrorism has been referred to as the poor mans nuclear arsenal.

12 12 HISTORY OF BIOLOGICAL WARFARE Ancient Scythians dipped arrows in manure. Ancient Scythians dipped arrows in manure. Assyrians used ergot of rye in enemy wells. Assyrians used ergot of rye in enemy wells. In 1346, (Siege of Kaffa) the Tartar army hurled corpses of soldiers who died of plaque into the city. In 1346, (Siege of Kaffa) the Tartar army hurled corpses of soldiers who died of plaque into the city. In the 15 th century, Pizzaro used Vaiola contaminated clothing to kill South American Indians. In the 15 th century, Pizzaro used Vaiola contaminated clothing to kill South American Indians. During the French and Indian War, smallpox - contaminated blankets were given to the Indians by the English. During the French and Indian War, smallpox - contaminated blankets were given to the Indians by the English.

13 13 Recent Bioterrorism During WW I, German secret agents introduced glanders to horse populations in New York and Virginia. They also attempted to introduce anthrax to horses and mules in Maryland. In addition, they used a combination of glanders and anthrax on horses, mules, cattle, sheep and reindeer in Norway, Romania, France, Spain and Argentina. During WW I, German secret agents introduced glanders to horse populations in New York and Virginia. They also attempted to introduce anthrax to horses and mules in Maryland. In addition, they used a combination of glanders and anthrax on horses, mules, cattle, sheep and reindeer in Norway, Romania, France, Spain and Argentina.

14 14 Recent Bioterrorism During WW II, the Germans continued to develop biological agents for use against livestock as well as humans. During WW II, the Germans continued to develop biological agents for use against livestock as well as humans. The British made anthrax cakes to drop on German cattle. The British made anthrax cakes to drop on German cattle. The US and Canada developed feather bombs laced with hog cholera and Newcastle virus for poultry for use on German livestock. The US and Canada developed feather bombs laced with hog cholera and Newcastle virus for poultry for use on German livestock.

15 15 Recent Bioterrorism In 1992, a year after the collapse of the Soviet Union, Russia admitted to a program code-named Ecology that produced biological agents aimed specifically at livestock, poultry and plants that employed tens of thousands of people in at least 8 separate production plants. In 1992, a year after the collapse of the Soviet Union, Russia admitted to a program code-named Ecology that produced biological agents aimed specifically at livestock, poultry and plants that employed tens of thousands of people in at least 8 separate production plants. Animal weapons included foot and mouth disease, rinderpest, classical swine fever (hog cholera), African swine fever and sheep and goat pox viruses. Animal weapons included foot and mouth disease, rinderpest, classical swine fever (hog cholera), African swine fever and sheep and goat pox viruses.

16 16 Recent Bioterrorism After the fall of the Soviet Union, some scientists went to the United States, Great Britain and other European countries. After the fall of the Soviet Union, some scientists went to the United States, Great Britain and other European countries. But others ended up in Iraq and other decidedly unfriendly countries. But others ended up in Iraq and other decidedly unfriendly countries.

17 17 American Life Changes Forever With the bombings at Kenya, Tanzania, and other terrorists acts ultimately leading up to the World Trade Center and Pentagon attacks of September 11, 2001, the free life style we enjoy came to an end. With the bombings at Kenya, Tanzania, and other terrorists acts ultimately leading up to the World Trade Center and Pentagon attacks of September 11, 2001, the free life style we enjoy came to an end. Although we cannot allow terrorism to totally control our lives, we must become vigilant of the possibilities that exist. Although we cannot allow terrorism to totally control our lives, we must become vigilant of the possibilities that exist.

18 18

19 19

20 20 A Real Bioterrorist Attack What would happen if there was a real bioterrorist attack on our food supply?; What would happen if there was a real bioterrorist attack on our food supply?; 1)The export market would collapse. 1)The export market would collapse. 2)Food processing plants would close. 2)Food processing plants would close. 3)Growers wouldnt be able to sell their produce. 3)Growers wouldnt be able to sell their produce. 4)Food companies would institute massive layoffs 4)Food companies would institute massive layoffs 5)Numerous retail grocery stores would close 5)Numerous retail grocery stores would close 6)Stocks would fall 6)Stocks would fall

21 21 Terrorists Attack Those things could theoretically happen but if we proactively think and plan for the possibility that it will, the effects will be minimized. Those things could theoretically happen but if we proactively think and plan for the possibility that it will, the effects will be minimized. Remember that the goal of terrorism is to instill fear. The actual effects of a terrorists act are usually far less than the paralyzing effects of fear itself. Remember that the goal of terrorism is to instill fear. The actual effects of a terrorists act are usually far less than the paralyzing effects of fear itself.

22 22 Why Bioterrorism Poor mans nuclear arsenal Poor mans nuclear arsenal Used against living organisms Used against living organisms Plants Plants Animals Animals Discussions have been primarily centered around humans Discussions have been primarily centered around humans Why not against livestock Why not against livestock

23 23 Agricultural Producers The producers of all livestock, poultry and crops should be aware of what to do if a disease breaks out whether it be a natural case or one initiated by an act of terrorism. The key words of action are; The producers of all livestock, poultry and crops should be aware of what to do if a disease breaks out whether it be a natural case or one initiated by an act of terrorism. The key words of action are; *PREVENT *PREVENT *RESPOND *RESPOND *MINIMIZE THE ADVERSE EFFECTS *MINIMIZE THE ADVERSE EFFECTS

24 24 PREVENT Always do what you can to prevent a natural disease from occurring and note any suspicious activity in your area by unknown people. Always do what you can to prevent a natural disease from occurring and note any suspicious activity in your area by unknown people. In the past, agricultural producers have been extremely good at this. In the past, agricultural producers have been extremely good at this.

25 25 RESPOND TO If a disease breaks out, respond to it quickly and methodically. If a disease breaks out, respond to it quickly and methodically. The faster a producer responds to a crisis, the lesser the effects will be. The faster a producer responds to a crisis, the lesser the effects will be. Contact your local Cooperative Extension agent. They have a list of veterinarians and crop specialists who can diagnose the problem and can mobilize all the necessary agencies necessary to contain the spread. Contact your local Cooperative Extension agent. They have a list of veterinarians and crop specialists who can diagnose the problem and can mobilize all the necessary agencies necessary to contain the spread.

26 26 MINIMIZE THE ADVERSE EFFECTS Once the disease has been diagnosed, the Cooperative Extension Service agent should let you know what to do to prevent the spread of the disease. Once the disease has been diagnosed, the Cooperative Extension Service agent should let you know what to do to prevent the spread of the disease. We have all recently seen diseases such as mad- cow in Great Britain, various forms of poultry diseases and hoof and mouth in other countries and how they contained/eliminated the disease to minimize the spread. We have all recently seen diseases such as mad- cow in Great Britain, various forms of poultry diseases and hoof and mouth in other countries and how they contained/eliminated the disease to minimize the spread.

27 27 Our Food Supply Channel

28 28 Photo courtesy of USDA

29 29 Photo courtesy of USDA

30 30 Photo courtesy of USDA

31 31 Photo courtesy of USDA

32 32 Photo courtesy of USDA

33 33 Photo courtesy of USDA

34 34 Photo courtesy of USDA

35 35 Photo courtesy of USDA

36 36 Photo courtesy of USDA

37 37 Our Food Supply Chain Up to this point, we have covered the importance of guarding our food supply chain, the history of bioterrorism and what the agricultural producer community can to to respond to a biological crisis, either instigated by nature or bioterrorists. Up to this point, we have covered the importance of guarding our food supply chain, the history of bioterrorism and what the agricultural producer community can to to respond to a biological crisis, either instigated by nature or bioterrorists. We will now go to the next step of protecting our food supply chain from the food processor to the consumer.. We will now go to the next step of protecting our food supply chain from the food processor to the consumer..

38 38 FDA GUIDELINES The FDA has recently issued guidelines for various elements of the food supply chain. The FDA has recently issued guidelines for various elements of the food supply chain. These guidelines are available on line at the following websites. These guidelines are available on line at the following websites.

39 39 Food Processors Food Producers, Processors and Transporters; Food Security Preventative Measures Guidance; Food Producers, Processors and Transporters; Food Security Preventative Measures Guidance;

40 40 Photo courtesy of USDA

41 41 Food Importers Importers and Filers: Food Security Preventative Measures Guidance. Importers and Filers: Food Security Preventative Measures Guidance.

42 42

43 43 Retail Food Stores & Restaurants Retail Food Stores and Food Service Establishments; Food Security Preventative Measures Guidance; Retail Food Stores and Food Service Establishments; Food Security Preventative Measures Guidance;

44 44 Photo courtesy of USDA

45 45 Photo courtesy of National Restaurant Assoc

46 46 FDA GUIDANCE Depending on your business, we suggest that someone from every company have one designated person obtain a copy of the appropriate guidance document, study it and make recommendations to implement the suggestions that are pertinent to their business. Depending on your business, we suggest that someone from every company have one designated person obtain a copy of the appropriate guidance document, study it and make recommendations to implement the suggestions that are pertinent to their business. The FDA only published these as guidelines to help the food industry. They are only for guidance and are not legally binding. The FDA only published these as guidelines to help the food industry. They are only for guidance and are not legally binding.

47 47 GUIDANCE The guidance in the next few pages identifies the kinds of preventative measures operators of food processing establishments may take to minimize the risk that food under their control will not be subject to tampering or other malicious, criminal, or terrorist action. It is relevant to all sectors of the food system. The guidance in the next few pages identifies the kinds of preventative measures operators of food processing establishments may take to minimize the risk that food under their control will not be subject to tampering or other malicious, criminal, or terrorist action. It is relevant to all sectors of the food system.

48 48 Guidance The FDA encourages operators of food processing establishments to review their current procedures and controls in light of the potential for tampering or other malicious, criminal or terrorist actions and make appropriate improvements. The FDA encourages operators of food processing establishments to review their current procedures and controls in light of the potential for tampering or other malicious, criminal or terrorist actions and make appropriate improvements.

49 49 Guidance The FDA recommends that operators consider the goal of each preventative measure, assess whether the goal is relevant to their operation and, if it is, design an approach that is both efficient and effective to accomplish the goal under the operators conditions of operation. The FDA recommends that operators consider the goal of each preventative measure, assess whether the goal is relevant to their operation and, if it is, design an approach that is both efficient and effective to accomplish the goal under the operators conditions of operation.

50 50 Trade Associations It may be relevant for food processors to look to their respective trade associations for further guidance. Some trade associations have already developed food security guidance that is appropriately focused for that specific industry. For example, The International Dairy Food Association has developed a food security guidance document as an aid to the dairy industry. It may be relevant for food processors to look to their respective trade associations for further guidance. Some trade associations have already developed food security guidance that is appropriately focused for that specific industry. For example, The International Dairy Food Association has developed a food security guidance document as an aid to the dairy industry.

51 51 Photo courtesy of National Restaurant Assoc

52 52 Food Processor Guidance Since most of the guidances offered by the FDA are similar, we will only go through the food processor guidance so you can obtain a feel for the types of procedures one should consider. Since most of the guidances offered by the FDA are similar, we will only go through the food processor guidance so you can obtain a feel for the types of procedures one should consider.

53 53 Guidance The guidance is divided into 5 sections related to individual components of a food establishment; The guidance is divided into 5 sections related to individual components of a food establishment; *Management *Management *Human element-staff *Human element-staff *Human element-public *Human element-public *Facility *Facility *Operations *Operations

54 54 MANAGEMENT

55 55

56 56 MANAGEMENT Prepare for the possibility of tampering/terrorism acts; Prepare for the possibility of tampering/terrorism acts; 1)Assign responsibility for security to a knowledgeable individual. 1)Assign responsibility for security to a knowledgeable individual. 2)Conduct an initial assessment of food security procedures and operations. 2)Conduct an initial assessment of food security procedures and operations. 3)Develop a security management strategy to prepare for tampering/terrorist acts. 3)Develop a security management strategy to prepare for tampering/terrorist acts.

57 57 Management 4)Plan for emergency evacuation. 4)Plan for emergency evacuation. 5)Maintain floor or flow plans in a secure, off-site location. 5)Maintain floor or flow plans in a secure, off-site location. 6)Become familiar with the emergency response system in your community. 6)Become familiar with the emergency response system in your community. 7)Make management aware of 24 hour contact information for local, state and federal police, fire, rescue and Homeland security. 7)Make management aware of 24 hour contact information for local, state and federal police, fire, rescue and Homeland security. 8)Who in management should be alerted about potential security problems?. 8)Who in management should be alerted about potential security problems?.

58 58 Management 9)Promote food security awareness to employees to alert staff of suspicious activity. 9)Promote food security awareness to employees to alert staff of suspicious activity. 10)Have an internal communication system to inform and update staff on security issues. 10)Have an internal communication system to inform and update staff on security issues. 11)Have a strategy to communicate with the public-press releases, spokesperson etc. 11)Have a strategy to communicate with the public-press releases, spokesperson etc.

59 59 Management Supervision; Supervision; 1)Provide appropriate supervision to all staff, janitorial services, contract workers etc. 1)Provide appropriate supervision to all staff, janitorial services, contract workers etc. 2)Conduct routine security checks of the premises to include production lines, telephone and computer systems, etc. for signs of tampering/terrorists acts and areas that may be vulnerable to such actions. 2)Conduct routine security checks of the premises to include production lines, telephone and computer systems, etc. for signs of tampering/terrorists acts and areas that may be vulnerable to such actions.

60 60 Management *Recall Strategy 1)Identify a person responsible and a back- up. 1)Identify a person responsible and a back- up. 2)Provide for a total recall plan. 2)Provide for a total recall plan. 3)Identify customer contacts and all emergency telephone numbers. 3)Identify customer contacts and all emergency telephone numbers.

61 61 Management Investigation of Suspicious Activity Investigation of Suspicious Activity 1)Investigate threats and information about signs pointing toward tampering/terrorists activities. 1)Investigate threats and information about signs pointing toward tampering/terrorists activities. 2)Alert appropriate law enforcement and public health officials about threats and suspicious activity. 2)Alert appropriate law enforcement and public health officials about threats and suspicious activity.

62 62 Management Evaluation Program Evaluation Program 1)Evaluate lessons learned from previous experiences in this area. 1)Evaluate lessons learned from previous experiences in this area. 2)Review and verify, at least annually, the effectiveness of the security management system (e.g. do mock recalls and simulated terrorists acts). 2)Review and verify, at least annually, the effectiveness of the security management system (e.g. do mock recalls and simulated terrorists acts). 3)Perform random food security inspections of all appropriate areas of the facility. 3)Perform random food security inspections of all appropriate areas of the facility. 4)Verify that security contractors are doing the appropriate job. 4)Verify that security contractors are doing the appropriate job.

63 63 Human Element-Staff

64 64 Human Element-Staff Screening-Screen pre-hire, at hiring and post-hire. Screening-Screen pre-hire, at hiring and post-hire. 1)Examine the background of all staff including part-time, contract labor, seasonal etc 1)Examine the background of all staff including part-time, contract labor, seasonal etc 2)Screening must be applied equally to all staff, regardless of race, national origin, religion and citizenship/immigration status.

65 65 Human Element-Staff *Daily work assignments *Daily work assignments 1)Know who is and who should be on premises, where they are located and on what shifts. 1)Know who is and who should be on premises, where they are located and on what shifts. 2)Keep information updated on personnel. 2)Keep information updated on personnel.

66 66 Human Element-Staff Identification Identification *Develop a system of positive identification for the workforce and collect the uniforms, name tags and ID card or badge when an employee is no longer employed. *Develop a system of positive identification for the workforce and collect the uniforms, name tags and ID card or badge when an employee is no longer employed.

67 67 Human Element-Staff Restricted Access Restricted Access 1)Identify staff who require unlimited access to all areas of the facility. 1)Identify staff who require unlimited access to all areas of the facility. 2)Limit access to staff of only those areas they need to be in necessary to perform their job functions. 2)Limit access to staff of only those areas they need to be in necessary to perform their job functions.

68 68 Human Element-Staff Personal Items; Personal Items; 1)Restrict the type of personal items allowed in establishment. 1)Restrict the type of personal items allowed in establishment. 2)Prevent staff from bringing personal items (lunch containers, purses etc) into food handling and storage areas. 2)Prevent staff from bringing personal items (lunch containers, purses etc) into food handling and storage areas. 3)Provide regular inspection of contents of staff lockers and vehicles when on company property. 3)Provide regular inspection of contents of staff lockers and vehicles when on company property. (Check state and local code for legality first). (Check state and local code for legality first).

69 69 Human Element-Staff Training in Food Security Procedures; Training in Food Security Procedures; 1)Incorporate food safety awareness training into other staff training programs. 1)Incorporate food safety awareness training into other staff training programs. 2)Provide periodic reminders to staff of food security procedures. 2)Provide periodic reminders to staff of food security procedures. 3)Encourage all staff support 3)Encourage all staff support

70 70 Human Element-Staff Unusual Behavior Unusual Behavior 1)Watch staff for unusual behavior such as working odd hours, accessing files/information/ areas outside their area of responsibility of work, removing documents from the facility, asking unusual questions etc 1)Watch staff for unusual behavior such as working odd hours, accessing files/information/ areas outside their area of responsibility of work, removing documents from the facility, asking unusual questions etc

71 71 Human Element-Staff Staff Health Staff Health *Be alert for atypical health conditions that staff may voluntarily report and absences that could be an indicator of tampering/ terrorist actions.-e.g.numerous people complaining about similar symptoms in the same part of the plant. *Be alert for atypical health conditions that staff may voluntarily report and absences that could be an indicator of tampering/ terrorist actions.-e.g.numerous people complaining about similar symptoms in the same part of the plant.

72 72 Human Element-Public

73 73 Human Element-Public Visitors Visitors 1)Inspect incoming and outgoing vehicles, packages and briefcases for suspicious, inappropriate or unusual items or activity. 1)Inspect incoming and outgoing vehicles, packages and briefcases for suspicious, inappropriate or unusual items or activity. 2)Restrict entry into the establishment 2)Restrict entry into the establishment 3)Ensure that there is a valid reason before allowing visitors into the facility. 3)Ensure that there is a valid reason before allowing visitors into the facility. 4)Verify the identity of unknown visitors. 4)Verify the identity of unknown visitors.

74 74 Human Element-Public 5)Restrict access to food handling and storage areas 5)Restrict access to food handling and storage areas 6)Restrict access to locker rooms. 6)Restrict access to locker rooms.

75 75 Facility

76 76 Facility Physical Security; Physical Security; 1)Protect perimeter access with fencing. 1)Protect perimeter access with fencing. 2)Secure doors, windows, hatches, vent opening, ventilation systems, utility rooms, storage rooms, trailer bodies, railcars, bulk storage tanks etc as appropriate. 2)Secure doors, windows, hatches, vent opening, ventilation systems, utility rooms, storage rooms, trailer bodies, railcars, bulk storage tanks etc as appropriate. 3)Restrict the number of entrances to restricted areas. 3)Restrict the number of entrances to restricted areas. 4)Account for all keys to the establishment. 4)Account for all keys to the establishment.

77 77 Facility 5)Monitor the security of the premises using appropriate methods-security patrols, surveillance cameras. 5)Monitor the security of the premises using appropriate methods-security patrols, surveillance cameras. 6)Provide for appropriate interior and exterior lighting. 6)Provide for appropriate interior and exterior lighting. 7)Keep parking areas separate from entrances to food storage and processing areas. 7)Keep parking areas separate from entrances to food storage and processing areas.

78 78 Facility *Laboratory Safety; *Laboratory Safety; 1)Restrict access to laboratories 1)Restrict access to laboratories 2)Restrict laboratory materials to the laboratory 2)Restrict laboratory materials to the laboratory 3)Investigate any missing reagents, positive controls and anything suspicious. 3)Investigate any missing reagents, positive controls and anything suspicious. 4)Dispose of unneeded reagents and bacteria plates in a manner that minimizes the risk that they be used as a contaminant. 4)Dispose of unneeded reagents and bacteria plates in a manner that minimizes the risk that they be used as a contaminant.

79 79 Facility Storage and use of poisonous and toxic chemicals. Storage and use of poisonous and toxic chemicals. 1)Limit the number of chemicals in storage to only what is needed to operate the facility. 1)Limit the number of chemicals in storage to only what is needed to operate the facility. 2)Store toxic and poisonous chemicals away from food handling and storage areas. 2)Store toxic and poisonous chemicals away from food handling and storage areas. 3)Limit access to chemicals to only those who use them. 3)Limit access to chemicals to only those who use them.

80 80 Facility 4)Ensure that chemicals are properly labeled 4)Ensure that chemicals are properly labeled 5)Investigate missing chemical stock and irregularities outside the normal amounts used. 5)Investigate missing chemical stock and irregularities outside the normal amounts used.

81 81 OPERATIONS

82 82 Operations Incoming Materials and Contract Operations; Incoming Materials and Contract Operations; 1)Use only licensed and reputable contract manufacturing and packaging operators and sources of incoming raw material, ingredients, compressed gases, labels etc. 2)Ensure that suppliers, contract operators and transporters use appropriate security measures. 3)Request locked and/or sealed vehicles, containers and railcars.

83 83 Operations 4)Establish delivery schedules and investigate unexplained and unscheduled deliveries and drivers. 5)Supervise off-loading of incoming raw materials. 6)Investigate shipping documents with suspicious alterations. 7)Inspect all incoming raw materials to include ingredients, packaging materials, product returns for signs of tampering, contamination and damage.

84 84 Storage 1)Have a system for receiving, storing and handling distressed, damaged, returned and rework products that minimizes their potential for being compromised. 2)Keep track of incoming materials. 3)Investigate missing or extra stock or other irregularities outside the normal range of variability.

85 85 Photos courtesy of USDA

86 86 Security of Water and Utilities 1)Limit access to controls for airflow, water, electricity and refrigeration. 2)Ensure that water systems are equipped with backflow prevention. 3)Identify alternative sources of potable water for use during emergency situations where normal water systems have been compromised.

87 87 Finished Products 1)Ensure that public storage warehousing and shipping operations practice appropriate security measures. 2)Conduct random inspection of storage facilities, vehicles and vessels. 3)Request locked/sealed vehicles,containers and railcars. 4)Establish scheduled pickups and not accepting unexplained, unscheduled pickups

88 88 Finished Product 5)Develop a tracking system to monitor finished product. 6)Advise sales staff to be on the lookout for counterfeit products or rumors of tampering/ terrorists actions.

89 89 Photo courtesy of USDA

90 90 Mail/ Packages 1)Implement procedures to ensure the security of incoming mail and packages.

91 91 Access to Computer Systems 1)Restrict access to computer process control systems and critical data systems to those with appropriate clearance. 2)Review the adequacy of virus protection systems and procedures for backing up critical computer based data systems.

92 92 FDA Emergency Point of Contact U.S. Food and Drug Administration U.S. Food and Drug Administration 5600 Fishers Lane 5600 Fishers Lane Rockville, MD Rockville, MD / /

93 93 CONCLUSIONS The security of our food supply is very important for the economic stability of our nation and must be viewed as a system from production, processing, distribution and ultimately in food stores or restaurants. The security of our food supply is very important for the economic stability of our nation and must be viewed as a system from production, processing, distribution and ultimately in food stores or restaurants. The use of biological warfare dates back many centuries. The use of biological warfare dates back many centuries. Agricultural producers must continually be vigilant of disease outbreaks and work to prevent, respond and minimize the adverse effects. Agricultural producers must continually be vigilant of disease outbreaks and work to prevent, respond and minimize the adverse effects.

94 94 CONCLUSIONS The FDA has issued some guidelines for food processors, importers and retail food stores and restaurants to use to incorporate into their organizations to minimize the probability of malicious, criminal or terrorists action on our food supply The FDA has issued some guidelines for food processors, importers and retail food stores and restaurants to use to incorporate into their organizations to minimize the probability of malicious, criminal or terrorists action on our food supply

95 95


Download ppt "1 SECURITY OF OUR FOOD SUPPLY 2202 Steven C Seideman Extension Food Processing Specialist Cooperative Extension Service University of Arkansas."

Similar presentations


Ads by Google