This element ensures a site is prepared for combating a terrorist-like incident. The Food Defense plan should address the physical security of a site including visitor/employee protocol; chemical, equipment, and ingredient storage; and product transport of raw materials and/or ingredients from approved suppliers or finished product transport.
Preventative methods for addressing intentional and harmful adulteration to food products for the purpose of terrorist-like acts.
The measure of a harmful potential risk to a food product or process.
The measure of availability for a food product or process to be reached.
1. CREATE AND BUILD A FOOD DEFENSE TEAM
i. Create a team of committed employees to create, assess, evaluate, and maintain the site’s Food Defense plan.
Examples: Think of those employees in your organization that have been trained and have oversight of many aspects of your site. Consider diversifying your team to cover all site areas, management levels, and responsibilities. Could you include you Quality Manager? Your Plant Manager? List: First and Last Name, Title, Phone Number, Email
List: First and Last Name, Title, Phone Number, Email
2. IDENTIFY WHAT YOU’RE WORKING WITH
i. Describe your site. Describe your employees. Describe your products and the processes associated with making those products.
Site Description: Building site with two processing rooms, one storage room, and one office area. One entry and exit to storage room. One entry and exit to processing room. Hallway joins storage room and processing room #1. Fence closes outside perimeter. One entry and exit for site grounds guarded 24/7 by guard. Nearby buildings include post office and consulting firm. Receiving area is in the rear of the building. All suppliers must enter from the same entrance as all employees, visitors, etc. through the guarded area.
Employee Description: 15 full-time employees. Contractors are used for equipment maintenance, pest control, and equipment calibration.
Product Description: Manufacture two (2) types of cookies. One is sugar and the other is chocolate chip.
3. CONDUCT A VULNERABILITY ASSESSMENT
i. List the process name and the process steps
Example: Process Name: Cookie dough
Process Steps Name: Receiving
1. Cookie dough is received from approved Supplier (Ted’s Cookie Ingredients Address: 1234 Sugar Lane, Mississippi, USA)
2. Jackie Tossem checks to make sure product is received at temperature below 41F with calibrated thermometer and records reading.
3. Received product is then placed in cooler storage area room #4.
ii. Measure and record how accessible and vulnerable each process is 1-10 scale (create your scale)
Example: The FDA has created an Accessibility scale and Vulnerability scale as shown below:
iii. List where accessibility and vulnerability could be breached in the process step. Ask question such as,
4. DEVELOP PREVENTATIVE STRATEGIES
i. List strategies next to each process step for mitigating potential threats. These are physical barriers such as installing an alarm system to all exit doors, peer monitoring high risk areas, ensuring barriers such as gates and walkways to areas of high vulnerability have limited accessibility, using employee uniform colors to distinguish allowed areas of entrance for employees, etc.
5. PREPARE A LIST OF EMERGENCY CONTACTS
i. Think of necessary emergency contacts should a threat occur. Do you have a local fire department? A local FBI department? A chemical control company?
ii. List all, but not limited to, these emergency contacts with two contact names, an emergency number, emergency email, and any other contact information necessary.
6. CREATE AN ACTION PLAN
i. Plan dates for when these action steps will occur. Appoint an employee to be responsible for each action step. Monitor the progress whether completed, in progress, or not started.
7. CONDUCT A SELF-ASSESSMENT
i. Conducted annually to validate that the Food Defense plan is not only documented and implemented, but also actually mitigating the threats it was intended to prevent.
ii. Ideally, this should be done by someone unaffiliated and unfamiliar with the Food Defense plan to ensure a non-biased assessment. This could be done through a third-party or another employee within the site.