Food Defense - Mitigation
Strategies To Protect Food
Against Intentional
Adulteration
Dr. Bob Strong
June 20, 2016
1
Our Presenter Today
Dr. Bob Strong
– Senior Consultant – SAI Global Assurance Services
– Driving force behind our food safety operations in the
areas of Good Manufacturing Practice (cGMP) and
supplier assurance programs (GFSI), including SQF,
BRC and FSSC 22000.
− 45 years of experience in the food industry, while working for national
and international companies in quality assurance, product development
and auditing. He is an often requested seminar speaker in the areas of
GMP, HACCP and HARPC.
− Ph.D. and BSC in Chemistry and an accomplished food safety trainer
for numerous food safety manager certification courses
− In addition, he is a GMP/HACCP/HARPC instructor, a Lead Auditor
trainer, and is also certified to consult on the Global Food Safety
Initiative. He is certified in 21 SQF product categories
2
Agenda
• Exempted Businesses
• Mitigation Strategies as a part of FSMA
• Contents of a Food Defense Plan
1. Vulnerability Assessments (Qualified Individuals).
2. Actionable Process Steps
3. Focused Mitigation Strategies (Qualified Individuals).
4. Monitoring
5. Corrective Actions
6. Verification
• Recordkeeping
• Effective and Implementation Dates
3
Exempted Businesses
This requirement applies to all facilities that are required to
register with the FDA as a Qualified Business with the
exception of the following facilities:
• Farms, except if they produce milk.
• Very small businesses with <$10,000,000 in sales.
• Storage facilities that store packaged food that is not
exposed;
(Not exempt if they hold liquid in bulk tanks).
• Facilities that re-pack, re-label foods as long as the
food is not exposed.
• Alcohol manufacturers.
• Animal Food manufacturers and distributors.
Food Safety Modernization Act (FSMA) 2010
• Title 1 Designed to improve capacity to prevent food safety problems
• Title 2 Designed to improve capacity to detect and respond to food
safety problems
• Title 3 Designed to improve the safety of imported food
• Title 4 Includes miscellaneous provisions
5
Title 1 Sections -
Designed to prevent food safety problems
• Section 101 FDA access to your records
• Section 102 Registration and possible suspension by FDA
• Section 103 Preventive Controls for Human Foods
• Section 104 FDA hazard information
• Section 105 Produce food safety guidelines
• Section 106 Regulations to prevent intentional adulteration
• Section 107 Fee assessments by FDA
• Section 108 National agriculture and food defense strategy
6
FSMA Section 103
Preventive Controls for Human food
• Sec. 103 of the Food Safety Modernization Act describes Preventive
Controls for Human Food in the following way:
“The owner, operator, or agent in charge of a facility shall, in accordance with
this section, evaluate the hazards that could affect food manufactured,
processed, packed, or held by such facility, identify and implement
preventive controls to significantly minimize or prevent the occurrence of
such hazards and provide assurances that such food is not adulterated
under section 402 or misbranded under section 403(w), monitor the
performance of those controls, and maintain records of this monitoring as a
matter of routine practice.
7
cGMPs 21 CFR 117 Subpart C
Hazard Analysis and Risk-Based Preventive Controls
• 117.126 Food Safety Plan • 117.150 Corrective actions and
corrections
• 117.130 Hazard Analysis
• 117.155 Verification
• 117.135 Preventive Controls
• 117.160 Validation
• 117.136 Preventive Controls
exemptions • 117.165 Verification of
implementation and effectiveness
• 117.137 Assurances required
for exemption • 117.170 Reanalysis
• 117.39 Recall Plan • 117.180 Requirements applicable
to preventive controls qualified
• 117.140 Preventive control
individual and a qualified auditor
management components
• 117.180 Implementation records
• 117.145 Monitoring
required for this subpart
117.130(b) Hazard Identification
• Known or reasonably foreseeable hazards can be
− Naturally occurring hazards;
− Unintentionally introduced hazards.
− Intentionally introduced hazards for possible economical gain
and to also include acts of terrorism.
• As the FDA has also identified that an employee’s possible
deliberate act of contamination of your products is a risk then you
need to also address this possibility and hence mitigate the risk in
your Food Defense program.
9
FSMA Section 106
Prevention of Intentional Contamination
Under Sec. 106 of the Food Safety Modernization Act the FDA
has determined that Processors and Distributors, where
applicable to the latter, need to use a HACCP approach to
determine the
• Nature of the types of hazards for which measures should be
taken to mitigate the hazard.
• To do this you need to perform a Vulnerability Assessment of
your premises, products and processes.
10
Possible Deliberate Contamination sources
• FDA has identified 3 types of deliberate acts of contamination
− Acts of Terrorism
− Disgruntled employees, consumers or competitors
− Economically motivated adulteration
(i.e. melamine). DELIBERATE
CONTAMINATION
FDA in discussions with the intelligence community has identified the inside
attacker as the greatest threat.
The following are cases were this has happened and hence support this fact.
December 1996, Berlin, Wisconsin
• The organochlorine pesticide chlordane was intentionally added to livestock
carcasses taken to a rendering plant. The contaminated carcasses were mixed
into livestock feed that was distributed to more than 4,000 farms, mostly dairy
operations, in a four-state area.
• The perpetrator then sent letters to customers notifying them of the contamination,
resulting in recalls of cheese, butter and ice cream. Product disposal cost more
than $4 million. In addition, 4,000 tons of feed and 500,000 pounds of
contaminated fat had to be destroyed. The cost to the feed producer targeted in
the incident was over $250 million. The event economically impacted the affected
farms, local feed companies, processors and others in the food supply chain.
• A competitor of the targeted facility was charged for this criminal contamination.
Apparently the competitor’s wife had had a romantic involvement with someone at
the targeted facility.
• The Wisconsin secretary of agriculture referred to the incident as an act of
domestic terrorism.
12
Michigan, 2003 -- Nicotine Poisoning After
Ingestion of Contaminated Ground Beef
• On January 3, 2003, the Michigan Department of Agriculture's (MDA) Food
and Dairy Division and the U.S. Department of Agriculture (USDA) were
notified by a supermarket of a planned recall of approximately 1,700 pounds
of ground beef because of customer complaints of illness after eating the
product.
• On January 10, the supermarket notified MDA that their laboratory had
determined that the contaminant in the ground beef returned by customers
with reported illness was nicotine.
• Approximately 100 persons were affected and a person at the supermarket
was arrested and charged with deliberately poisoning the ground beef.
2012 Needles placed in sandwiches
• On July 17th a Delta flight from Amsterdam
to the USA was found to have been
catered with sandwiches that contained
sewing needles.
• Nobody was seriously injured but potential
was worrying.
• On August 3rd Air Canada flight reported a
needle in a sandwich on flight from
Victoria to Toronto.
14
December 2013 Japan
• A contract employee at Aquilfoods in Japan deliberately adulterated several
frozen foods using Malathion
• 2843 people got sick
• 6.4 million packages of frozen seafood were recalled
15
Possible breach of food defense leads to recall of
chicken products -- June 18, 2016.
• Minnesota’s GNP Company, based in Cold Spring, late Saturday recalled
approximately 55,608 pounds of chicken products that may be
contaminated with extraneous materials, according to the U.S. Department
of Agriculture’s Food Safety and Inspection Service (FSIS).
• The company discovered sand and black soil was turning up in some of
the products, and reported it to FSIS. No one has reported any adverse
reactions to the contaminated products. GNP Company and local law
enforcement are investigating how the sand and soil got into the chicken
products.
16
121.126. Food defense plan Requirements
You must prepare, or have prepared, and implement a written food defense plan.
The written food defense plan must include:
• (1) The written vulnerability assessment, including required explanations, to identify
significant vulnerabilities and actionable process steps as required by § 121.130(c);
• (2) The written mitigation strategies, including required explanations, as required by
§ 121.135(b);
• (3) The written procedures for the food defense monitoring of the implementation of
the mitigation strategies as required by § 121.140(a);
• (4) The written procedures for food defense corrective actions as required by
§ 121.145(a)(1); and
• (5) The written procedures for food defense verification as required by § 121.150(b).
• (c) Records. The food defense plan required by this section is a record that is
subject to the requirements of subpart D of this part.
17
Step 1. Prepare a Food Defense Program
• The first step in preparing a Food Defense Program is to perform a
Vulnerability Assessment
18
121.130 Vulnerability assessment requirements to identify
significant vulnerabilities and actionable process steps
You must conduct or have conducted a vulnerability assessment for each type of
food manufactured, processed, packed, or held at your facility using appropriate
methods to evaluate each point, step, or procedure in your food operation to
identify significant vulnerabilities and actionable process steps.
(a) Appropriate methods must include, at a minimum, an evaluation of:
(1) The potential public health impact (e.g., severity and scale) if a contaminant
were added;
(2) The degree of physical access to the product; and
(3) The ability of an attacker to successfully contaminate the product.
(b) Inside attacker. The assessment must consider the possibility of an inside
attacker.
19
121.130 Vulnerability assessment requirements to identify
significant vulnerabilities and actionable process steps
(c) Written vulnerability assessment
• Regardless of the outcome, the vulnerability assessment must be written
and must include an explanation as to why each point, step, or procedure
either was or was not identified as an actionable process step.
20
121.3. Qualified Individual
• Qualified individual means a person who has the education, training, or
experience (or a combination thereof) necessary to perform an activity
required under subpart C of this part, as appropriate to the individual’s
assigned duties.
• A qualified individual may be, but is not required to be, an employee of the
establishment.
121.4. Qualifications of individuals who perform
activities
• (a) Applicability. You must ensure that each individual who performs activities
required under subpart C of this part is a qualified individual as that term is
defined in § 121.3.
• (b) Qualifications of individuals assigned to an actionable process step.
Each individual assigned to an actionable process step (including temporary
and seasonal personnel) or in the supervision thereof must:
– (1) Be a qualified individual as that term is defined in § 121.3—i.e., have
the appropriate education, training, or experience (or a combination
thereof) necessary to properly implement the mitigation strategy or
combination of mitigation strategies at the actionable process step; and
– (2) Receive training in food defense awareness.
121.4. Qualified Individual
A Qualified Individual must have successfully completed training for the specific
function at least equivalent to that received under a standardized curriculum
recognized as adequate by FDA or be otherwise qualified through job experience
to conduct the activities.
Job experience may qualify an individual to perform these functions if such
experience has provided an individual with knowledge at least equivalent to that
provided through the standardized curriculum.
Training Records
e) Records. Training required by paragraphs (b)(2) and (c)(2) of this
section must be documented in records, and must:
(1) Include the date of training, the type of training, and the persons
trained; and
(2) Be established and maintained in accordance with the
requirements of subpart D of this part.
Are you ready for these new Food Defense requirements?
• Yes I believe so
• Not yet, but we have started the process
• Not yet, we need to get a Food Defense Management person trained
• Not yet, Food Defense Training for our team is required
25
Foods considered harder to contaminate
Examples of where contamination would be easier to
detect hence lower risk for deliberate contamination.
• Shell Eggs
• Most Whole Produce and Vegetables
(Apples have however had needles and razor
blades placed in them)
• Game Meats (Whole or Cut but not ground or
shredded)
• Peanuts and Tree Nuts (Raw, In-Shell)
• Sugar Cane and Sugar Beets
Possible Vulnerable Areas
FDA has determined that the presence of one or more of these key
activity types at a process step (e.g., manufacturing, processing,
packing, or holding of food) indicates a significant vulnerability under
section 418 of the FD&C Act and that the food is at high risk of
intentional adulteration caused by acts of terrorism under section 420
of the FD&C Act.
• Bulk liquid receiving and loading;
• Liquid storage and handling;
• Secondary ingredient handling; and
• Mixing and similar activities.
27
Ingredient and product handling vulnerabilities
• Ingredient weighing rooms
• Pre-mix areas
• Adding rework back to products
• Returned products
Mixing and similar exposed product areas
• Mix kettles
• Blending operations
• Grinding operations
• Open processing points
Mixing and similar exposed product areas
Other possible vulnerable areas
• Unsealed trailers, railcars, tankers allowing access to tamper with
products.
• Unlocked doors into your facility allowing easy access to products.
• Unlocked windows on street level allowing access to your facility.
• Inlets into building for receiving liquids including water, if latter is from
an unprotected well.
Definition of an Actionable Process Step
• Actionable process step means a point, step, or procedure in a food
process where a significant vulnerability exists and at which mitigation
strategies can be applied and are essential to significantly minimize or
prevent the significant vulnerability.
Step 2. Actionable Process steps
A Facility can identify their actionable process steps using one of two
procedures.
• The FDA-identified key activity types (CARVER and Shock), OR
• By conducting their own facility-specific vulnerability assessments
33
FDA CARVER Program
Criticality
Accessibility
Recuperability
Vulnerability
Effect
Recognizability
FDA SHOCK Program
SHOCK
Added to CARVER program to assess the
combined health, economic and
psychological impacts of an attack within the
food industry.
121.135. Mitigation strategies for actionable process
steps
(a) You must identify and implement mitigation strategies at each
actionable process step to provide assurances that the significant
vulnerability at each step will be significantly minimized or prevented
and the food manufactured, processed, packed, or held by your facility
will not be adulterated under section 402 of the Federal Food, Drug,
and Cosmetic Act.
For each mitigation strategy implemented at each actionable process
step, you must include a written explanation of how the mitigation
strategy sufficiently minimizes or prevents the significant vulnerability
associated with the actionable process step.
(b) Mitigation strategies and accompanying explanations must be written.
Possible Focused Mitigation Strategies–Bulk
Products
• Establish check-in and shipment verification procedures, such as
checking seals and associated documentation
• Restrict movement of delivery drivers if allowed into the facility
• Secure transfer hoses in locked cabinets
• Install locks on tanks inside and outside
• Restrict access to bulk tanks to only key individuals
• Cameras
37
Suggested Focused Mitigation Strategies – General
• Always ensure a clear line of sight to actionable process steps
(e.g., store stacks of pallets in less obstructive location).
• Reduce staging time of ingredients and in-process products including
rework.
• Avoid employees working in rooms on their own with exposed
products/ingredients.
• Retrofit equipment to reduce accessibility
(e.g., install lids on open mixers).
38
Possible Focused Mitigation Strategies –In-process
Products
• Supervisors
• Cameras
• Restricting employee flow
• Locked doors from outside
• Restricted Visitor movement
• Equipment covers
• Peer observations
39
Step 3. Implementation of Mitigation Strategies
(121.138)
Mitigation strategies required under § 121.135 are subject to the following
mitigation strategies management components as appropriate to ensure
the proper implementation of the mitigation strategies, taking into account
the nature of each such mitigation strategy and its role in the facility’s food
defense system:
(a) Food defense monitoring in accordance with § 121.140;
(b) Food defense corrective actions in accordance with § 121.145; and
(c) Food defense verification in accordance with § 121.150.
40
Step 4. Monitoring of Mitigation Strategies (121.140)
As appropriate to the nature of the mitigation strategy and its role in the
facility’s food defense system:
• (a) Written procedures.
You must establish and implement written procedures, including the
frequency with which they are to be performed, for food defense
monitoring of the mitigation strategies.
• (b) Food defense monitoring.
You must monitor the mitigation strategies with adequate frequency to
provide assurances that they are consistently performed.
• (c) Records—
(1) Requirement to document food defense monitoring.
You must document the monitoring of mitigation strategies in
accordance with this section in records that are subject to verification in
accordance with § 121.150(a)(1) and records review in accordance with
§ 121.150(a)(3)(i).
41
Step 4. Monitoring of Mitigation Strategies (121.140)
• (2) Exception records.
Records may be affirmative records demonstrating the mitigation
strategy is functioning as intended.
Exception records demonstrating the mitigation strategy is not
functioning as intended may be adequate in some circumstances.
42
Step 5. Corrective Actions (121.145)
(a) Food defense corrective action procedures.
As appropriate to the nature of the actionable process step and the nature
of the mitigation strategy:
• (1) You must establish and implement written food defense corrective
action procedures that must be taken if mitigation strategies are not
properly implemented.
• (2) The food defense corrective action procedures must describe the
steps to be taken to ensure that:
– (i) Appropriate action is taken to identify and correct a problem that
has occurred with implementation of a mitigation strategy; and
– (ii) Appropriate action is taken, when necessary, to reduce the
likelihood that the problem will recur.
43
Step 5. Corrective Actions Records (121.145)
(b) Records. All food defense corrective actions taken in accordance with
this section must be documented in records that are subject to food
defense verification in accordance with § 121.150(a)(2) and records
review in accordance with § 121.150(a)(3)(i).
44
Step 6. Verification Procedures (121.150)
(a) Food defense verification activities.
Food defense verification activities must include, as appropriate to the
nature of the mitigation strategy and its role in the facility’s food defense
system:
• (1) Verification that food defense monitoring is being conducted as
required by § 121.138 (and in accordance with § 121.140);
• (2) Verification that appropriate decisions about food defense corrective
actions are being made as required by § 121.138 (and in accordance
with § 121.145);
45
Step 6. Verification Procedures (121.150)
(3) Verification that mitigation strategies are properly implemented and are
significantly minimizing or preventing the significant vulnerabilities. To do
so, you must conduct activities that include the following, as appropriate to
the facility, the food, and the nature of the mitigation strategy and its role in
the facility’s food defense system:
• (i) Review of the food defense monitoring and food defense corrective
actions records within appropriate timeframes to ensure that the
records are complete, the activities reflected in the records occurred in
accordance with the food defense plan, the mitigation strategies are
properly implemented, and appropriate decisions were made about
food defense corrective actions; and
• (ii) Other activities appropriate for verification of proper implementation
of mitigation strategies; and
46
Step 6. Verification Procedures (121.150)
(4) Verification of reanalysis in accordance with § 121.157. (b) Written
procedures.
You must establish and implement written procedures, including the
frequency for which they are to be performed, for verification activities
conducted according to § 121.150(a)(3)(ii).
47
121.305 General requirements applying to records
Records must:
a) Be kept as original records, true copies (such as photocopies,
pictures, scanned copies, microfilm, microfiche, or other accurate
reproductions of the original records), or electronic records;
b) Contain the actual values and observations obtained during food
defense monitoring;
c) Be accurate, indelible, and legible;
d) Be created concurrently with performance of the activity documented;
48
121.305 General requirements applying to records
(e) Be as detailed as necessary to provide history of work performed; and
(f) Include:
– (1) Information adequate to identify the facility (e.g., the name, and
when necessary, the location of the facility);
– (2) The date and, when appropriate, the time of the activity
documented;
– (3) The signature or initials of the person performing the activity; and
– (4) Where appropriate, the identity of the product and the lot code, if
any.
49
Steps to implement an effective Food Defense Program
• Ensure that personnel and supervisors assigned to actionable
process steps receive appropriate training in food defense awareness
and their respective responsibilities in implementing focused
mitigation strategies.
• Establish and maintain certain records, including
– the written food defense plan;
– written identification of actionable process steps and the
assessment leading to that identification;
– written focused mitigation strategies;
– written procedures for monitoring and corrective actions;
– verification;
– documentation related to training of personnel.
50
Steps to implement an effective Food Defense
Program
1. Identify and implement focused mitigation strategies at each actionable
process step to provide assurances that the significant vulnerability at each
step will be significantly minimized or prevented and that the food
manufactured, processed, packed, or held by such facility will not be
adulterated
2. Establish and implement procedures, including the frequency with which they
are to be performed, for monitoring the focused mitigation strategies.
3. Establish and implement corrective action procedures that must be taken if
focused mitigation strategies are not properly implemented.
4. Verify that monitoring is being conducted and appropriate decisions about
corrective actions are being made; verify that the focused mitigation
strategies are consistently implemented and are effectively and significantly
minimizing or preventing the significant vulnerabilities; and conduct a
reanalysis of the food defense plan.
51
What is your biggest challenge?
• Shortage of time
• Our culture is to trust people
• We feel these requirements are intrusive
52
§ 121.157 . Reanalysis
a) You must conduct a reanalysis of the food defense plan, as a whole at
least once every 3 years;
b) You must conduct a reanalysis of the food defense plan as a whole, or
the applicable portion of the food defense plan:
(1) Whenever a significant change made in the activities conducted at
your facility creates a reasonable potential for a new vulnerability or a
significant increase in a previously identified vulnerability;
53
§ 121.157 . Reanalysis
(2) Whenever you become aware of new information about potential
vulnerabilities associated with the food operation or facility;
(3) Whenever you find that a mitigation strategy, a combination of
mitigation strategies, or the food defense plan as a whole is not
properly implemented; and
54
§ 121.157 . Reanalysis
(4) Whenever FDA requires reanalysis to respond to new
vulnerabilities, credible threats to the food supply, and developments
in scientific understanding including, as appropriate, results from the
Department of Homeland Security biological, chemical, radiological, or
other terrorism risk assessment.
55
§ 121.157 . Reanalysis
(c) You must complete such reanalysis required by paragraphs (a) and (b)
of this section and implement any additional mitigation strategies needed
to address the significant vulnerabilities identified, if any:
(1) Before any change in activities (including any change in mitigation
strategy) at the facility is operative;
(2) When necessary within 90-calendar days after production; and
(3) Within a reasonable timeframe, providing a written justification is
prepared for a timeframe that exceeds 90 days after production of the
applicable food first begins.
56
§ 121.157 . Reanalysis
(d) You must revise the written food defense plan if a significant
change in the activities conducted at your facility creates a reasonable
potential for a new vulnerability or a significant increase in a previously
identified vulnerability or document the basis for the conclusion that no
revisions are needed.
57
§ 121.315 Requirements for record retention
(a)
(1) All records required by this part must be retained at the
facility for at least 2 years after the date they were prepared.
(2) Records that a facility relies on during the 3-year period
preceding the applicable calendar year to support its status as
exempt as a very small business must be retained at the facility as
long as necessary to support the status of a facility as a very small
business during the applicable calendar year.
(b) The food defense plan must be retained for at least 2 years after its
use is discontinued.
58
§ 121.315 Requirements for record retention
(c) Except for the food defense plan, offsite storage of records is
permitted if such records can be retrieved and provided onsite within 24
hours of request for official review. The food defense plan must remain
onsite.
Electronic records are considered to be onsite if they are accessible
from an onsite location.
(d) If the facility is closed for a prolonged period, the food defense plan
may be transferred to some other reasonably accessible location but
must be returned to the facility within 24 hours for official review upon
request.
59
§ 121.310 Additional requirements applying to the food
defense plan
The owner, operator, or agent in charge of the facility must sign and
date the food defense plan:
• (a) Upon initial completion; and
• (b) Upon any modification.
60
Effective and Compliance Dates
• Effective date is July 26, 2016
• Compliance dates are:
– Large businesses have 3 years
– Small businesses (<500 FTE Employees) have 4 years
– Very small businesses (<$10 million sales) have 5 years to prove
they are exempt
61
SAI Global
• SAI Global was founded in 1922
• Largest registrar in North America, 14,000+ sites / 60,000+ globally
• Both local and global resources: 500 Auditors within North America and
1,600 Globally
• Deliver audits by global accreditation bodies such as JASANZ and ANAB
• Accredited to deliver audits and certify organizations against a wide
range of international standards
• We have a deep global footprint with over 2000 employees in 29
countries across Europe, the Americas and Asia-Pacific
• Provide a number of training options including public courses, online and
in-house
62
Assurance Services – Auditing & Certification
Food Safety Seafood Packaging
• SQF • Global GAP Standards • SQF
• BRC • Global Aquaculture Alliance • BRC Packaging
• FSSC 22000 BAP Standards • IFS PACSecure
• HACCP • ASC Standards • FSSC 22000
• GlobalG.A.P. • ASC Chain of Custody
• ISO 22000
• GMP
• Gluten Free
• Animal Welfare
Learning & Improvement Solutions
• Public training (classroom)
• On-site training / In-house training*
• eLearning courses
• Free Webinars & Other educational resources
www.saiglobal.com/courses
www.saiglobal.com/assurance/resource-library/
*Excel Partnership and SAI Global CS Pty operate independently. Any audit provided by our Certification Services
Business is totally independent of any work we may have done through our Improvement Solutions Business and will
not provide our clients with any special treatment.
Learning & Improvement Solutions
• Public training (classroom) course topics include*:
− Threat Assessment and Critical Control Point
− FSPCA Preventive Controls for Human Food
− HACCP for Food Processors
− Advanced HACCP
− Allergen Management for Food Manufacturers
− Nonconformities and Root Cause Analysis for Food Safety
− Traceability and Recall for Food Manufacturers
− Introduction to Food Allergens
www.saiglobal.com/courses
* Excel Partnership and SAI Global CS Pty operate independently. Any audit provided by our Certification Services
Business is totally independent of any work we may have done through our Improvement Solutions Business and will
not provide our clients with any special treatment.
Learning & Improvement Solutions
Vulnerability and Threat Assessment Critical Date Location
Control Point
August 5 Toronto, ON
This 1 day course provides the knowledge and skills October 21 Charlotte, NC
required to develop and implement a Threat
Assessment Critical Control Point (TACCP) study. October 28 Orlando, FL
Key Session Topics:
• Understand the difference between
HACCP/TACCP and VACCP
• Recognize the different types of threats
• Classify the different types of aggressors and
develop a TACCP system
Course price $495
*Excel Partnership and SAI Global CS Pty operate independently. Any audit provided by our Certification Services
Business is totally independent of any work we may have done through our Improvement Solutions Business and will
not provide our clients with any special treatment.
Learning & Improvement Solutions
eLearning course topics: Benefits of online learning:
• Threat Assessment and Critical Convenient
Control Point Cost effective
• Root Cause Analysis Flexible
• Allergen Management
• Traceability Training
• Food Safety Internal Auditor Training
• Lead Auditor Training
• Principles and Applications of HACCP
• HACCP Refresher
www.saiglobal.com/training/assurance/eLearning/
* Excel Partnership and SAI Global CS Pty operate independently. Any audit provided by our Certification Services
Business is totally independent of any work we may have done through our Improvement Solutions Business and will
not provide our clients with any special treatment.
Learning & Improvement Solutions
Online Vulnerability and Threat Assessment Critical Control Point
This 1.5 hour eLearning course provides the appropriate knowledge and skills required to
develop and implement a Threat Assessment Critical Control Point (TACCP) study and
also provides information on how to conduct a raw material vulnerability study. There are
a series of online exercises which will assist in the development and implementation of a
TACCP study.
Course price $249
*Excel Partnership and SAI Global CS Pty operate independently. Any audit provided by our Certification Services
Business is totally independent of any work we may have done through our Improvement Solutions Business and will
not provide our clients with any special treatment.
Assurance Services
• TRANSFER your certification today! Local auditors, Global
reach:
SQF
BRC
FSSC 22000
GLOBALG.A.P.
ISO 22000
HACCP
GMP
Animal Welfare
Packaging
Looking for more information?
www.saiglobal.com
Certification Inquiries Training Inquiries
(800) 465-3717 (877) 426-0714
[email protected] [email protected]70
Dr. Bob Strong
Senior Consultant
SAI Global - Americas
Mobile 513-349-5398
Email [email protected]
71