Step three in developing a food defense plan.  All vendors providing processed foods to USDA federal feeding programs must be in compliance with the.

Slides:



Advertisements
Similar presentations
GOALS FOR TODAY Understand how to write a HACCP Plan
Advertisements

Understanding Basic Components:
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
Step three in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
ALERT: The Basics Food and Drug Administration Center for Food Safety and Applied Nutrition.
Standard Operating Procedure What is an SOP? Who should Write? Format and Content of SOPs How to Implement Managing Change Control Who is Responsible?
Capability Cliff Notes Series PHEP Capability 8—Medical Dispensing and Countermeasures What Is It And How Will We Measure It?
CNP DIRECTORS’ WORKSHOP Administrative Review Be Prepared! March 14, 2014.
1 Proposed Rule to Protect Food Against Intentional Adulteration
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
United States Department of Agriculture Food Safety and Inspection Service 1 General HACCP Industry FSA Methodology Walk-through December 18, 2008 Washington,
AFISS Prospectus of Services AFISS offers HACCP food safety and food quality systems development and management services including preparation for regulatory.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
Step two in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
NSF CYBER-SECURITY SUMMIT: INFORMATION SECURITY CLAUSE  Influenced by recommendations from previous Cyber-Security Summit meetings, the clause was added.
Proposed Rule to Protect Food Against Intentional Adulteration 1.
Food Safety Is Risky Business Food Safety Is Risky Business Nancy Flores, Ph.D., Extension Food Technology Specialist Various.
Achieving Certification A To-Do list for Your Certification Project FSSC
Food Safety Modernization Act Proposed Rules Tim Slawinski Food and Dairy Division Michigan Department of Agriculture and Rural Development.
SACS Reaffirmation Project Compliance Certification Team Leaders Meeting Friday, August 27, – 11:00AM 107 Main Building Jennifer Skaggs, Ph.D. SACS.
Achieving Certification A To-Do list for Your Certification Project.
Support Programs version 2 March 2010 Cleaning and Sanitation
Overview of HACCP Burel Group. Objectives Define HACCP Define HACCP Understand HACCP Principles Understand HACCP Principles Review Current Practices Review.
IDEA EC Grant Application & Fiscal Accountability New Charter Leaders Institute June 16-17, 2015 Valencia W. Davis, Consultant IDEA, Part B Programs NCDPI.
National Food Service Management Institute The University of Mississippi.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Part 2 Meal Counting and Claiming Provided by the LAUSD Food Services Division
CIP UPDATES Sec. VI Parental Involvement Paula Reese Division of Federal and Special Programs Mobile County Public School System.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Implementation & Maintenance of a LM Control Program.
FSIS Directive Verifying an Establishment's Food Safety System - Revision 4 OPPD/PDS Thursday District Correlation.
Evaluation IEP Development, Review and Revision Placement
INFECTIOUS DISEASE Presented by Kim Zapata,NREMTP Ems Coordinator Medic One, Inc. Cincinnati, Ohio.
Doane Pet Care Company Pet Food Safety System (PFSS) M.W. Merkel September 23, 2003 Animal Feed Safety System Public Meeting.
Food hygiene inspection.. Food hygiene inspection Code of Practice Northern Ireland Annex 5. – Type of food and method of handling – Method of processing.
Environmental Officer Responsibility Summary Fort Wainwright, Alaska Environmental Officer Course 2011 Name//office/phone/ address UNCLASSIFIED 1/28/2016.
Sandler & Travis Trade Advisory Services, Inc. Reducing Risk Through Internal Training: Measurement tools to assess training success WESCCON October 16,
2016 RecruitmentIndividual Accommodation Plans Return To WorkPerformance & Career General Requirements Include statement of commitment on all Baxter job.
School Safety and Security Proposed Projects and Upgrades.
Hazard analysis and critical control point (HACCP)
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Welcome to Developing a Food Safety Program National Food Service Management Institute The University of Mississippi.
Overview of SACS-COC Reaffirmation Process Prepared for Reaffirmation Steering Committee April 10, 2006.
FOOD SAFETY REQUIREMENTS FOR SCHOOLS SCHOOL AND COMMUNITY NUTRITION May 2016.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XI)
Module 5: Designing Physical Security for Network Resources
Personnel.
Food Safety Program Based on HACCP Principles by Ramadan Badran
Author: Nurul Azyyati Sabri
Planning a Smart Path to Part 117 Implementation
Role of the Preventive Control Qualified Individual
Achieving Certification
Prerequisite Programs
Disaster Relief – You and Your Emergency Preparedness Plan
خطة سلامة الغذاء Food Safety Plan
Cybersecurity compliance for attorneys
Achieving Certification
What Is VQIP? FDA required to establish a program to provide for the expedited review of food imported by voluntary participants. Eligibility is limited.
Presentation transcript:

Step three in developing a food defense plan

 All vendors providing processed foods to USDA federal feeding programs must be in compliance with the Food Defense System.

 Vulnerability assessment  Map of facility  Operational documents  HACCP plan  SOP or GMP  BQA or PQA plans

 Designate a food defense coordinator to develop, implement and maintain the Food Defense Plan Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists,

 Describe each vulnerability specifically.  Decide if the vulnerability is practical to address.  Determine a countermeasure.

 Decide who will be responsible to implement the countermeasure.  Choose a reasonable timeline for implementation.  Initial and date plan when implementation of countermeasure is completed.

 Review and revise the plan to accommodate new and newly elevated risks  Train the employees regarding their effort in:  Prevention  Detection  Response

 Test the countermeasures after implementation  Make unannounced entrances at various checkpoints  Check locks in vulnerable areas  Perform a mock recall  Test inventory procedures

 Re-evaluate the plan annually or as products, processes or facilities change.  Copies of the plan should be kept on-site and off-site.