Step two in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.

Slides:



Advertisements
Similar presentations
Barhale Procedure for Site Establishment
Advertisements

Safety in Hospitals A Computer – Based Learning Program for Students.
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Understanding Residential Safety and Security August 19, 2010.
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
Step three in developing a food defense plan.  In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Crime Prevention Through Environmental Design
Contractor Induction Program Gippsland Southern Health Service is committed to a safe and healthy work environment.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Step three in developing a food defense plan.  All vendors providing processed foods to USDA federal feeding programs must be in compliance with the.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute.
Step four in developing a food defense plan.  Having a food defense plan reduces the risk of intentional contamination, but cannot prevent it.  Having.
Step one in developing a food defense plan.  Production Agriculture  Supplies  Transportation  Auctions  Feedlots.
In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is.
Step one in developing a food defense plan.  Production Agriculture  Food Processing  Retail Food Sales.
● Do you have workers who may have a grudge? ● Think like an individual that would like to harm your operation.
Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of.
In a Beef Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication.
In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Burglary Prevention MORRISVILLE POLICE DEPARTMENT.
TM Foundations of Real Estate Management BOMA International Module 5: Putting it All Together Security ® ®
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
High-Rise Life Safety for
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Celebrate Safe Communities How CPTED and related activities can help you engage community members of all ages!
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
SPECIAL SERVICES and McBRIDE & SON CONTRACTING BUILDER’S BLOC Present SECURITY AWARENESS.
Prevent Crime In Your Neighborhood Writing a paragraph.
Security Management Providing a Secure Environment.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
St. Bartholomew’s Hospital Rochester, Kent Background Crime/Risks to be addressed Interventions.
Physical (Environmental) Security
LESSON 11 PHYSICAL SECURITY Prepared by: Camo, Christian Leo O. BS Criminology LEA 2.
CHAPTER 31.  Rules for payment are different for home  Medicaid and Medicare could be used  Depends on situation Skilled Home Care Long-term Home Care.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Food Safety, Work Place Safety, and Emergency Preparedness National Food Service Management Institute The University of Mississippi 1.
UNDP Offices in the Field Physical Security Standards  MOSS provides uniform security standards for UN offices in capitals and the field – read it. 
Biosecurity Training Module 3
Keep your neighborhood safe. Where do you live? a house an apartment a condominium.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
SEC 410 Entire Course (UOP) SEC 410 Week 1 DQ 1 (UOP)  SEC 410 Week 1 Individual Physical Security Paper   SEC 410 Week 1 DQ 1   SEC 410 Week 1 DQ.
FIRE DRILL EVACUATION PROCEDURES T. F. North High School.
10. Security and Physical Protection Basic Concepts
Flagler County Sheriff’s Office “Lock it or Loose it Campaign” Sheriff James L. Manfre.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
SEC 410 cart Expect Success/sec410cartdotcom FOR MORE CLASSES VISIT
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Food Security Plans for the Meat Industry Food Security & Recall Plan Development for the Meat Industry March 6, 2010 Myrtle Beach, SC Lynn Knipe The Ohio.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
© 2011 Michigan State University and United Nations Industrial Development Organization, original at CC-BY-SA Food Defense.
Chapter 9 Security and Safety. I. Security: An Overview A. SECURITY DEFINED B. SECURITY OBLIGATIONS 1. Foreseeable Harm A landlord’s duty to take security.
Physical and Technological Security
What you will learn in this session
Crime Prevention Through Environmental Design
Access Control Limits the number of entrances and exits on a property.
Brandon Sauceda, MPH RRT Program Manager
A Holistic Approach to School Security
Neighborhood Watch Citizens banding together to help local law enforcement in identifying and then reporting suspicious activities in their neighborhood.
Facilities Management & Logistics
Objectives Telecommunications and Network Physical and Personnel
Safeguarding and Protecting individuals from abuse
Presentation transcript:

Step two in developing a food defense plan

 In 1984, members of an Oregon cult intentionally contaminated restaurant salad bars with Salmonella bacteria.  They were attempting to influence an election.  751 individuals became ill, and  45 of those were hospitalized.

 Countermeasures are actions taken to reduce the risk of intentional contamination in vulnerable areas.

 Procedures  Facility  Technology  Personnel

 Protect:  Personnel  Product  Property

 Lights  Dusk to Dawn lighting available through most electric coops  Motion sensor lighting  Visibility  Neighborhood Watch  Vegetation trimmed for visibility  Driveway alarm

 Lock Gates  Lock Buildings  Doors  Windows  Lock Well Head  Lock Supply Areas  Feed bins  Vet supplies  Chemicals

 Fences  Road Frontage  Limit gates  Signage  Buildings  Entrances  Visitor Log

 Principles: Check and Challenge  Check the contract and negotiate liability  Challenge contamination by adding barriers either physical or procedural

 See  Challenge  Ask  Notify