IFS FoodFraud-Guide - 1805
IFS FoodFraud-Guide - 1805
IFS FoodFraud-Guide - 1805
trusted
products.
IFS Standards
Product Fraud
Guidelines for Implementation
ENGLISH
IFS would like to thank all members of the national working groups, international
technical committee, IFS team and experts who have actively participated in the
conception and review of this guideline.
Introduction 5
6. Appendices 30
Appendix 1
Example IFS Food Version 6.1 – Vulnerability Assessment, Mitigation Plan
Development and Mitigation Plan Review 31
Appendix 2
Example IFS PACsecure Version 1.1 – Vulnerability Assessment,
Mitigation Plan Development and Mitigation Plan Review 40
Appendix 3
Auditor Questions and Documentation 47
Appendix 4
References 49
Slaughterhouse
BROKER
Slaughterhouse
BROKER
Introduction
Product fraud encompasses a wide range of deliberate fraudulent acts relating to food and food packaging,
all of which are economically motivated and have serious ramifications to consumers and businesses.
The most serious of these fraudulent act is the intentional and economically motivated adulteration (EMA)
of food and packaging, where there is an elevated risk in relation to consumer health. The example of
melamine adulteration of infant formula and milk in 2008, serves to remind the Food Industry how vulne-
rable the systems are within the supply chain and the total lack of regard for human health by the fraudsters.
Product fraud is not a new crime and there are well documented incidents dating back many hundreds
of years and was one of the main drivers for the drafting and implementation of Food Law. The European
horsemeat scandal in 2013, however raised the profile of food fraud and exposed the deficiencies of even
some of the industry’s larger companies and highlighted the unprecedented challenges the Food Industry
faces to the integrity and safety of its food supply chain, as the chain itself becomes more complex and
global in nature. Depending on sources, it is estimated that food fraud costs the global Food Industry
US$20 – $50 billion per year.
In addition to legislative requirements, which have been enacted to prevent product fraud and subsequent
enforcement activity both nationally and internationally, Industry bodies such as the Global Food Safety
Initiative (GFSI) have driven for food safety schemes, such as IFS, to introduce and implement systems to
mitigate the risk of food fraud.
Product fraud can occur at any point within the food supply chain and therefore IFS Standards ( IFS Food
V 6.1, IFS PACsecure V 1.1 and IFS Logistics V2.2) have incorporated the need for product fraud mitigation
measures to meet the requirements of the Global Food Safety Initiative (GFSI) Benchmarking Requirements
Document v7.1.
These Guidelines have been developed to assist users of IFS standards to understand the intent of IFS
product fraud requirements and to gain an understanding of how practices can be applied to meet these
requirements in relation to the scope of the specific standard.
NOTE:
The information in this document is not intended to be mandatory, the intention is to provide guidance
for companies to implement the IFS Standards product fraud requirements.
For the purposes of this document, the key terms and definitions relating to Product Fraud are:
Product Fraud
The deliberate and intentional substitution, mislabeling, adulteration or counterfeiting of food,
raw materials, ingredients or packaging placed upon the market for economic gain. This definition
also applies to outsourced processes.
Food Defense:
Procedures adopted to assure the security of food and their supply chain from malicious and ideolog-
ically motivated threats.
It should be noted that the method of risk assessment may vary from company to company and
it is recommended that, where possible, companies use the risk assessment methodology, which
they feel most comfortable with. The outcome of a quantitative risk assessment is typically a
‘numerical’ or ‘level’ of risk rating, which can then be used to decide upon the appropriate level of
monitoring and control measures to mitigate fraudulent acts against the company. It is reiterated
that IFS does not prescribe a particular methodology for the risk assessment.
Despite the variety of risk assessment methodologies, there are criteria which should always
be considered in relation to product fraud vulnerabilities. These criteria are specific to identify
possible product fraud exposure and differ considerably from those criteria related to food safety
and food defense.
These guidelines have been designed to assist users of IFS Standards to understand the concept
of risk management in relation to product fraud threats and how vulnerability assessments are
an integral part of the risk management process. Risk management includes risk management
planning, risk identification, the qualitative and quantitative analysis of risks, risk response
planning, monitoring and controlling the risk responses. (Reference Figure 1).
How the concept of risk management has been applied to food fraud vulnerabilities can be seen
in Figure 2 below.
FIGURE 1
Risk assessment
Establish risk
assessment group
Risk
identification
Review and
Evaluation
refine
of risk
process
Implement
and monitoring Risk response
of controls planning
Undertake the
Review and refine
product fraud
the product fraud
vulnerability
migration plan
assessment
Implement and
monitoring
of controls in Develop product
accordance with fraud migration
the product fraud plan
migration plan
In the case of IFS Standards, the principles of risk assessment will be followed and applied to the
development of a Product Fraud Mitigation Plan.
The development of a Product Fraud Mitigation Plan has a number of steps, namely:
• The identification of potential product fraud activities, using known and reliable data sources
• The evaluation of the level of risk; both product and supply source by carrying out a Product
Fraud Vulnerability Assessment
• The evaluation for the need for additional control measures
• Use of the results of the Product Fraud Vulnerability Assessment to develop the Product Fraud
Mitigation Plan
• Implement monitoring and control measures defined in the Product Fraud Mitigation Plan
• The Product Fraud Vulnerability Assessment and Product Fraud Mitigation Plan shall be
reviewed annually, or when there is increased risk identified by change to defined risk criteria.
It is important to appreciate that the effectiveness of the development and maintenance of any
Product Fraud Mitigation Plan is dependent on the quality of the data available for assessment
and the competence of the individuals within the Product Fraud Assessment Team. As the tech-
nical and commercial expertise differs in relation to the scope of the Standard in question, and
the team members may vary within any Product Fraud Assessment Team, this is reflected within
the Guidelines; examples of these are technical management, analysts, packaging technologists,
buyers and logistics/supply chain management.
In the sections of these Guidelines, general guidance has been developed and for each standard,
specific examples have been incorporated within a section or within an appendix:
• IFS Food Version 6.1 (Appendix 1)
• IFS PACsecure Version 1.1 (Appendix 2)
• IFS Logistics Version 2.2 (section 5)
The Product Fraud Mitigation Plan is developed by a systematic process defined within Figure 2
of these Guidelines.
WHY
In order to undertake an effective vulnerability assessment the Product Fraud Assessment Team
should identify the sources of information and data that relate to the risk factors, that will be
used within the vulnerability assessment. The sources of data should be documented and the
frequency at which the data should be assessed and by whom. For example, commercial data,
such as price and availability, should be the responsibility of the purchasing department Team
members and technical data, such as reports of fraudulent activity and detection methodology
developments should be the responsibility of the technical department Team members.
HOW
The information and data sources used to assess the potential of product fraud and other asso-
ciated information should be researched and once agreed, documented prior to the vulnerabil-
ity assessment. The initial information that should always be collated is an exhaustive list of all
product (raw materials, ingredients and packaging) and the supplier of each of the products;
where a process is outsourced the supplier should be identified.
The following table provides further guidance regarding the type of information to be found
within these data sources, who would be expected to review these and where necessary highlight
possible increased risk.
WHY
An effective, systematic documented product fraud vulnerability assessment will identify risk
of possible fraudulent activity within the supply chain. As product fraud may take the form of
deliberate and intentional substitution, adulteration, mislabeling or counterfeiting, the product
fraud vulnerability assessment shall be conducted on raw materials, ingredients, food packaging
and the food itself (including outsourced product). The product fraud vulnerability assessment,
if carried out correctly, will identify potential weaknesses in the supply chain, which have to be
addressed in the Product Fraud Mitigation Plan to minimize the risk of fraud.
Product fraud could have significant consumer safety implications, affect company profitability
and potentially damage company reputation.
FIGURE 3
An example of a typical quadratic risk matrix
Very Likely
Likely
Likelihood
Quite Possible
Possible
Not Likely
Impact
When undertaking vulnerability assessments there are three main criteria, which are of the utmost
importance to the food fraudster namely: profitability, the risk of detection and the ease of
carrying out the fraud.
Within any risk or vulnerability assessment there are risk factors that have to be defined to allow
the assessment to be carried out effectively. These Guidelines have been developed to pro-
vide advice and guidance on these product fraud risk factors, which can be used to develop a
quadratic risk matrix, and in turn can be used to develop the most appropriate control measures to
mitigate risk.
The vulnerability assessment shall have two basic elements; the product risk and the supplier risk.
FIGURE 4
An example of a Product Vulnerability Risk Matrix with Risk Rating for Likelihood of Occurrence and
Likelihood of Detection on Axes
Very Likely
5 Medium Medium High High High
Likelihood of Occurance
Likely
4 Low Medium Medium High High
FIGURE 5
An example of a Product Vulnerability Risk Matrix with Scored Risk Rating for Likelihood of Occurrence and
Likelihood of Detection on Axes and Product Risk Rating within the Matrix
Likely
4 Low Medium Medium High High
4 8 12 16 20
The colour of the cells within the product vulnerability risk matrix are indicative of the product
risk, namely; red is regarded as high risk, yellow is regarded as medium risk and green would be
regarded as low risk. Therefore, by their very nature, as assessed, the determined product risk
can be used to indicate the need for possible increased control measures for the mitigation of
food fraud.
History of product fraud – • The number, types and frequency of fraud carried out in relation
incidents to product.
Economic factors • Price (profitability of the product e.g. profit margin and quantity)
• Availability of the product (seasonality, reduce quantity / quality,
high consumer demand, quota)
• Availability of adulterant (quantity, price, nature of the adulterant)
• Tariff (increased or fluctuating government tariffs affecting price
and availability)
• Price Fluctuation (seasonality, reduced quantity / quality, high
consumer demand, quota, price setting mechanisms)
Ease of fraudulent activity • Physical nature of the product (liquid, powder, minced pieces,
whole)
• Cost and complexity of fraudulent process (location, processing
machinery, costs of production, packaging cost, distribution cost)
• Staff involvement in the fraudulent activity (number, ease of
concealment, number of locations)
• Packaging formats (packaging of raw material and adulterant)
Supply chain complexity • Geographical origin (location of source and length of supply chain)
• Types and number of organization in the supply chain
(manufacture, storage, distribution, agent or broker)
• Number of factories within the supplier organization
Current control measures for • Testing authority (certification bodies, auditing body, testing
detecting fraud laboratories and status [ accredited / non-accredited], inspection
bodies and status [accredited / non accredited])
• Testing methodology (accredited / non-accredited analytical
methodology, auditing [certificated / non-certificated],
product inspection, product testing body and status [accredited /
non-accredited])
• Testing frequency (auditing, product inspection, product testing)
• Cost of testing (product inspection, product testing, analytical
testing complexity)
PIZZA BASE
WHEAT FLOUR: USA, Canada, France, Germany
RAPESEED OIL: UK, France, Spain, Italy
YEAST: Germany, France TOMATO SAUCE
DEXTROSE: USA, China, Brazil, India, Pakistan TOMATO PUREE: Greece, Turkey, Italy, Spain, Argentina
MALTODEXTRIN: Brazil, Poland SUGAR: China, Germany, France, UK
PEPPER: Vietnam, Indonesia, India, Brazil, China
SALT: Germany, UK, France
OREGANO: Greece, Turkey, Macedonia
SOYA LECITHIN: Brazil, China, USA
BASIL: Egypt, Turkey
SAGE: Albania, Turkey
THYME: Morocco, Egypt, Albania, Poland
MODIFIED STARCH: Netherlands, Germany
SALT: Germany, UK, Russia
CARRAGEENAN: Philippines
SODIUM ALGINATE: UK
Likelihood of History of • The number, types and frequency of fraud (the more frequent
occurrence product fraud that a product has food fraud associated with it, the higher the risk)
incidents
Likelihood of Economic • Price (the higher the profit margin the higher the risk)
occurrence factors • Availability of the product (the lower the availability of a product,
the higher the risk)
• Availability of adulterant (the high availability and low cost of an
adulterant, the higher the risk)
• Tariff Costs (the higher the tariff cost, the higher the risk
• Price Fluctuation (the frequency and level of fluctuation will
determine risk)
Likelihood of Ease of • Physical nature of the product (liquids pose the highest risk and
occurrence fraudulent mixing of individual components e.g. whole fish, pose the lowest risk)
activity • Cost and complexity of fraudulent process (the more complex and
costly a process, the lower the risk)
• Staff involvement in the fraudulent activity (the more staff
involvement, the lower the risk)
• Packaging formats-raw material and adulterant (if product is
available unmarked and in bulk the higher the risk, if product is
prepackaged, marked and requires unpacking, the lower the risk)
Likelihood Supply chain • Geographical origin (the longer the distance from source to
of current complexity company, the higher the risk)
detection • Number of organization in the supply chain (the greater the
number of organizations in the supply chain, the higher the risk)
• Types of organization (the greater the number of manufacturers
and agents within the supply chain, the higher the risk)
• Number of factories within the supplier organization (the greater
the number of manufacturing units within one supplier organization
the higher the risk)
Likelihood Current • Testing authority (accredited testing companies pose the lowest
of current control risk, unaccredited or unknown companies pose the highest risk)
detection measures for • Testing methodology (accredited testing methodologies pose the
detecting lowest risk; unaccredited or unknown testing methodologies pose
fraud the highest risk)
• Testing frequency (the higher the frequency of testing the lower
the risk)
• Cost of testing (the higher the cost of testing the greater the risk)
History of business • Duration of business between the companies (the longer the
duration of business between the supplier and the company,
the lower the risk)
• Good business history e.g. no disputes, no commercial or
technical issues (the better the business relationship history
between the supplier and the company, the lower the risk)
Country of supply regulatory • Level of regulatory control at the source of product in relation
infrastructure and controls with country regulatory quality (the higher level of comparable
regulatory control the lower the risk)
• Intergovernmental relationships with the country of supply
(the higher the level of government interface and controls
the lower the risk)
Country and business ethics • Level of corruption within product supplier’s country (the higher
the level of corruption the higher the risk)
• Ethical working conditions (the poorer the ethical working
conditions within the supplier the higher the risk)
• Environmental conditions (the poorer the environmental
conditions within the supplier the higher the risk)
The supplier risk, like product risk, can be graded dependent upon the confidence the company
has with the supplier and is based upon defined risk factors and risk sub-factors within the
table above.
For example:
1 Very High Confidence
2 High Confidence
3 Medium Confidence
4 Low Confidence
5 Very Low Confidence
Raw material, ingredient and • Testing methodology-accredited methodology (if the testing
packaging analytical testing methodology is accredited, the lower the risk)
• Testing methodology – detection level (the lower the detection
level, the lower the risk)
• Accredited / non-accredited laboratory (if the laboratory is
accredited the lower the risk, if the laboratory is non-accredited,
the higher the risk)
• Reliability /validation of the laboratory (if there is evidence of
good reliability of the laboratory, the lower the risk)
• Controls at reception: orders making reference to agreed
specifications, verification of delivery documents, origin and
batch related inspection
Third party technical audit • Accredited certification body against a known and recognized
standard (an accredited certification body poses, the lowest risk)
• Non-accredited certification body against a known and recognized
standard (a non-accredited certification body poses, the
highest risk)
• Audit report and Certificate (a detailed audit report and certificate
poses the lowest risk)
• Certificate (a certificate without a report poses, the highest risk)
Second party technical audit • Accredited certification body against a company standard
(an accredited certification body poses, the lowest risk)
• Non-accredited certification body against a company standard
(a non-accredited certification body poses, the highest risk)
• Audit frequency and scope of audit (the more frequent and robust
scope, the lower the risk)
First party technical audit • Audit undertaken by own employee (the more competent the
employee, the lower the risk)
• Audit frequency and scope of audit (the more frequent and robust
scope, the lower the risk)
Chain of custody certification • Accredited certification body against a known and recognized
standard (an accredited certification body poses, the lowest risk)
• Non-accredited certification body against a known and recognized
standard (a non-accredited certification body poses, the highest risk)
• Audit report and Certificate (a detailed audit report and certificate
poses, the lowest risk)
• Certificate (a certificate without a report poses, the highest risk)
Mass balance testing • Mass balance testing as part of technical or chain of custody
certification audit (testing carried out in accordance with
certification process, the lowest risk)
• Extraordinary testing of mass balance (extraordinary testing under
company control poses, the lowest risk)
• Frequency and scope of testing (the more frequent and robust
scope, the lower the risk)
• Report (a detailed audit report poses, the lowest risk)
Legal compliance checking of • Review of legal conformity (existence and number of prosecutions)
supply chain suppliers
FIGURE 6
Food Fraud Mitigation Plan Template
4.6 The Review and Refinement of the Product Fraud Mitigation Plan
4.6.1 Changes to Risk Factors and Product Fraud Vulnerability Assessment Review
WHY
A Product Fraud Mitigation Plan will only remain effective, if changes to the risk factors that deter-
mine the risk within the food vulnerability are identified and these changes reviewed, in order to
maintain the required level of control measures.
HOW
The members of the Product Fraud Assessment Team should have access to the appropriate data
and information regarding the risk factors used for the vulnerability assessments.
When carrying out the initial Product Fraud Mitigation Plan, this should be regarded as a ‘snap shot
in time’, and there should be recognition that risk factors will change within a dynamic industry
such as the food industry. This will mean there should be in place the ability to revisit individual
products’ (and the suppliers of these products) risk assessments, if there are possible changes to
the overall risk in relation to possible food fraud.
The Product Fraud Assessment Team should review the product fraud vulnerability assessment
when significant changes occur. The following list are those regarded as significant changes, that
will prompt the Team to undertake a revised vulnerability assessment:
›› change in supply of raw materials e.g. new supplier
›› change in management or financial situation of supplier
›› change in cost of raw material(s)
›› change that effect the cost of finished product e.g. tariff increases, transport costs
›› change in supply chain e.g. additional suppliers, type of supplier
›› change in raw material availability, e.g. seasonal shortage, poor quality
›› evidence of fraud found by control measures such as analytical testing
›› evidence of increased customer or consumer complaints which are related to possible fraud,
e.g. poor quality and inconsistent quality
›› emergence of a newly recognised adulterate
›› development of scientific information regarding process, product or analytical identification
HOW
The members of the Product Fraud Assessment Team should have access to the appropriate data
and information regarding the risk factors used for the vulnerability assessments, which will allow
effective vulnerability assessments to be undertaken.
In accordance with the first part of this requirement, the Team members should regularly review
data and information for significant change, however all raw materials, ingredients, packaging and
outsourced product should be reviewed by undertaking a full vulnerability assessment at least
annually. The Product Fraud Assessment Team should use the same methodology for vulnerability
assessment, however they should review data/information sources to assess if new data/informa-
tion sources are appropriate.
The full vulnerability assessments shall be documented and dated in accordance with company
documentation control requirements.
HOW
When the Product Fraud Assessment Team undertake the full annual vulnerability assessments
or interim vulnerability assessments of individual raw materials, ingredients, packaging or out-
sourced processes, there is a need to also review the effectiveness of the control measures defined
within the Product Fraud Mitigation Plan.
The Product Fraud Assessment Team should use the same methodology for the development of
the Product Fraud Mitigation Plan, but should review the decision regarding control measures.
If there are changes to the current control measures, these changes should be made as soon as
practical.
Any changes to the Product Fraud Mitigation Plan should be documented and dated in accord-
ance with company documentation control requirements.
Although the Logistics Service Provider have few possibilities to mitigate directly product fraud,
as they have less interaction with the product itself, product fraud activity may occur within the
logistics sector of the supply chain and therefore reference is made to the assessment of risk and
the requirement for measures to be in place to mitigate any identified risk.
Although within the requirements of IFS Logistics Version 2.2 reference is not specifically made
to vulnerability assessments or a formal risk mitigation plan and is part of section 4.2.4, Receipt
of Goods and Storage, it is advisable that the general principles which apply to product fraud
vulnerability assessment (section 4 of these Guidelines) are utilised for the assessment of risk
within the logistics supply chain.
5.1.1 Food Fraud Risk Assessment Principles and Mitigation Control Measures
The storage, transport and other services (e.g., packing and labeling) involving raw materials and
finished product within the logistics sector, is an area where substitution and counterfeiting could
be expected as a major food fraud threat. The fraudsters could use the logistic supply chain to sub-
stitute or adulterate raw materials, particularly loose or unpackaged product, or use the legitimate
supply chain system to place counterfeit product onto the market. Mislabeling is also considered
as fraud, for example when best before dates are extended during co-packing activities.
As there is no processing or production of food within the logistics sector, consideration should
be given to factors such as economic factors, ease of the fraudulent activity, supplier business
history, commercial relationships, supplier technical control measures and country and business
ethics. Other factors that are relevant are the nature of the product and its status; typically, loose
or unpackaged product are a higher risk than product that has been packaged and labelled.
The controls that can be used to mitigate Food Fraud within the logistics supply chain are similar
to those which apply to Food Defense controls and should be considered (Reference IFS Food
Defense Guideline); good examples are where traceability / lot coding systems should be evident
as a measure of control and where tamper evidence is incorporated within the packaging design.
The most vulnerable products would be loose or unpackaged product, which are brought into the
company or dispatched from the company. The control and monitoring systems must therefore
be considered and are similar to those used to mitigate the risk of malicious contamination, e.g.
sealed containers, inspection, site security measures, documentation control and regular monitor-
ing of logistic control systems by first, second or third-party audits.
WHY
An effective, systematic documented hazard analysis and assessment will identify risk of possible
food fraud activity within the logistics supply chain. As food fraud may take the form of deliberate
and intentional substitution, adulteration, mislabeling or counterfeiting, the hazard analysis shall
be conducted on raw materials, ingredients, food packaging and food within the logistics supply
chain. The hazard analysis, if carried out correctly, will identify potential weaknesses in the logistics
supply chain, which should be addressed by risk mitigation control measures.
Loose product in Supplier Y – • Contract requiring locked containers and fitted with
open trays – small trans- company seal during transport.
risk-substitution port company • Review of records of container seals and consignment notes.
driver owned • Company procedures review
Low risk • Review of intake records
• Authorized consignment notes for all deliveries with
traceability/lot code data (Audit trail)
• Review of journey log Intake quality checks – low
sampling level
High value brand Supplier Z – • Contract requiring locked containers and fitted with
product small storage company seal on dispatch.
risk-counterfeiting facility • Review of records of product storage and quantity
poor systems • Company procedures review
and security • Review of intake records
High risk • Authorized consignment notes for all products stored with
traceability/lot code data
• Unannounced audits
• Intake quality checks – high sampling level
Appendix 1
Example IFS Food Version 6.1 – Vulnerability Assessment,
Mitigation Plan Development and Mitigation Plan Review
Appendix 2
Example IFS PACsecure Version 1.1 – Vulnerability Assessment,
Mitigation Plan Development and Mitigation Plan Review
Appendix 3
Auditor Questions and Documentation
Appendix 4
References
• Minced Beef Frozen block thawing process (outsourced process and raw material
purchasing outsourced)
By assessment using the risk factors and criteria for consideration, the Product Fraud Assessment Team
will, through consensus, assign a scoring of each risk factor, which in turn will confirm the product’s
position within the product vulnerability risk matrix. (Reference tables within section 4.3).
The overall product risk can be scored and assigned for each product/process by multiplying
the likelihood of occurrence and likelihood of current detection scores together to determine a product /
process position within the product vulnerability risk matrix.
5
5 5
(Very likely)
4
4
(Likely)
3
(Quite possible)
2
2
(Possible)
1
(Not likely)
Low risk of
occurrence
5
(Not likely)
4
(Possible)
3
(Quite possible)
2
3 3
(Likely)
1
2
(Very likely)
5
(Very likely)
4
(Likely)
3
(Quite possible)
2
(Possible) 2 2 2 2
1
(Not likely)
Low risk of
occurrence
5
1
(Not likely)
4
(Possible)
3
(Quite possible)
2
(Likely)
1
(Very likely) 2 2
5
(Very likely)
4
(Likely)
3
(Quite possible)
2
(Possible) 2 2
1
(Not likely) 1 1
Low risk of
occurrence
5
(Not likely)
4
(Possible)
3
(Quite possible)
2
(Likely)
1
(Very likely) 2 1 1
Overall Product Risk Score for Preprinted Kraft Board Tray Sleeves = 2
Likelihood of Occurrence (Highest Score Assigned) x Likelihood of Current Detection
(Highest Score Assigned)
Likelihood of Occurrence 2 x Likelihood of Current Detection 1 = 2
5
5 5
(Very likely)
4
(Likely)
3
3 3
(Quite possible)
2
(Possible)
1
(Not likely)
Low risk of
occurrence
Likelihood of Current Detection – Minced Beef Frozen Block Thawing Process (Outsourced Process
and Outsourced Raw Material Purchasing)
5
(Not likely)
4
4 4
(Possible)
3
(Quite possible)
2
2
(Likely)
1
(Very likely)
Overall Product Risk Score for Minced Beef Frozen Block Thawing Process
(Outsourced Process and Outsourced Raw Material Purchasing) = 20
Likelihood of Occurrence (Highest Score Assigned) x Likelihood of Current Detection
(Highest Score Assigned)
Likelihood of Occurrence 5 x Likelihood of Current Detection 4 = 20
From the assigned scores and the Product Risk Matrix (Reference Figure 5)
IFS FOOD FRAUD GUIDELINES 35
• where a raw material such as Extra Virgin Olive Oil has a very likely rating for likelihood of
occurrence and a quite possible rating for likelihood of current detection, the overall risk
rating within the matrix is within a high-risk area of the matrix.
• where a raw material such as Tomato Paste has a possible rating for likelihood of occurrence
and likely rating for likelihood of current detection, the overall risk rating within the matrix is
within a low risk area of the matrix.
• where packaging such as Preprinted Kraft Board Tray Sleeves has a possible rating for likeli-
hood of occurrence and a very likely rating for likelihood of current detection, the overall risk
rating within the matrix is within a low risk area of the matrix.
• where a raw material such as Minced Beef Frozen Block Thawing Process (Outsourced Process
and Outsourced Raw Material Purchasing) has a very likely rating for likelihood of occurrence
and a possible rating for likelihood of current detection, the overall risk rating within the
matrix is within a high-risk area of the matrix.
Likely
Quite possible
Likely
Quite Possible
Not Likely
Therefore, the position of product/process within the Product Risk Matrix will determine the
need for action to be taken to mitigate any possible risk of food fraud activity. In relation to the
examples above:
• Extra Virgin Olive Oil: it would be expected that, if adequate control measures are not in
place, additional control measures should be urgently considered and actioned.
• Tomato Paste: it would be expected that the current control measures be reviewed for
effectiveness and any decisions action.
• Preprinted Kraft Board Tray Sleeves: it would be expected that the current control measures
be reviewed for effectiveness and any decisions action.
• Minced Beef Frozen Block Thawing Process (Outsourced Process and Outsourced Raw
Material Purchasing): it would be expected that, if adequate control measures are not in
place, additional control measures should be urgently considered and actioned.
Raw material, Supplier Product Supplier Overall Current Team Control measures
ingredient, risk risk risk control decision
packaging food score score score measure
and outsourced rating
processes
Extra virgin Retain Retain control measures.
olive oil W 15 1 15 Medium supplier Product analysis program –
2 analysis per year
Extra virgin Retain Increase product analysis
olive oil X 15 2 30 Medium supplier program to 4 analyses per year
Raw material, Supplier Product Supplier Overall Current Team Control measures
ingredient, risk score risk score risk score control decision
packaging food measure
and outsourced rating
processes
By assessing using the risk factors and criteria for consideration the Product Fraud Assessment Team
should, through consensus, assign a scoring of each risk factor, which in turn will confirm the product’s
position within the product vulnerability risk matrix. (Reference tables in section 4.3).
The overall product risk can be scored and assigned for each product / process by multiplying the likeli-
hood of occurrence and likelihood of current detection scores together to determine a product / process
position within the product vulnerability risk matrix.
5
(Very likely)
4
4 4
(Likely)
3
3 2
(Quite possible)
2
(Possible)
1
(Not likely)
Low risk of
occurrence
5
(Not likely)
4
(Possible)
3
(Quite possible) 3 3
2
(Likely) 2
1
(Very likely)
5
(Very likely)
4
(Likely)
3
(Quite possible)
2
2 2 2
(Possible)
1
1
(Not likely)
Low risk of
occurrence
5
(Not likely)
4
(Possible)
3
(Quite possible) 3 3
2
(Likely) 2
1
(Very likely)
Overall Product Risk Score for Polyester base for lidding film = 6
Likelihood of Occurrence (Highest Score Assigned) x Likelihood of Current Detection
(Highest Score Assigned)
Likelihood of Occurrence 2 x Likelihood of Current Detection 3 = 6
5
(Very likely)
4
(Likely)
3
3 3
(Quite possible)
2
2 2
(Possible)
1
(Not likely)
Low risk of
occurrence
5
(Not likely)
4
(Possible)
3
(Quite possible)
2
(Likely)
1
(Very likely) 1 1 1
Overall Product Risk Score for Vacuum and Modified Atmosphere Film for
Pouch manufacture = 3
Likelihood of Occurrence (Highest Score Assigned) x Likelihood of Current Detection
(Highest Score Assigned)
Likelihood of Occurrence 3 x Likelihood of Current Detection 1 = 3
• From the assigned scores and the Product Risk Matrix (Reference Figure 8)
• where a raw material such as Kraft Board (PEFC Mark) has a likely rating for likelihood of occurrence
and a quite possible rating for likelihood of current detection, the overall risk rating within the matrix is
within a medium risk area of the matrix.
• where a raw material such as Polyester Base has a possible rating for likelihood of occurrence and quite
possible for likelihood of current detection, the overall risk rating within the matrix is within a low risk
area of the matrix.
• where packaging such as Vacuum and Modified Atmosphere Film has a quite possible rating for like-
lihood of occurrence and a very likely rating for likelihood of current detection, the overall risk rating
within the matrix is within a low risk area of the matrix
Quite Possible
3
Therefore, the position of product/process within the Product Risk Matrix will determine the need for
action to be taken to mitigate any possible risk of food fraud activity. In relation to the examples above:
• Kraft Board PEFC Mark: it would be expected that, if adequate control measures are not in place,
additional control measures should be urgently considered and actioned.
• Polyester Base: it would be expected that the current control measures be reviewed for effectiveness
and any decisions action.
• Vacuum and Modified Atmosphere Film: it would be expected that the current control measures be
reviewed for effectiveness and any decisions action.
Raw material, Supplier Product Supplier Overall Current Team Control measures
ingredient risk risk risk control decision
or food score score score measure
packaging rating
Raw material, Supplier Product Supplier Overall Current Team Control measures
ingredient risk risk risk control decision
or food score score score measure
packaging rating
Kraft Board Retain control measures. Rely
PEFC Mark Retain
W 12 1 12 High on Certification Report and
supplier
Chain of Custody Certification
Kraft Board Certification Report and
PEFC Mark Retain Chain of Custody Certification
X 12 2 24 High
supplier Additional annual audit with
mass balance exercise
Kraft Board Issues identified by Certifica-
PEFC Mark tion Body and mass balance
Consider
Chain of Custody Certification
Y 12 5 60 High discontinu-
issues and certificate sus-
ing supplier
pended Do not order this
product
Kraft Board
Certification Report and
FSC Mark Consider
Chain of Custody Certification
Z 12 4 48 High discontin-
Additional annual audit with
uing
mass balance exercise
Kraft Board Retain control measures. Rely
FSC Mark Retain
A 12 1 12 High on Certification Report and
supplier
Chain of Custody Certification
Polyester base
Retain Retain control measures.
B 6 1 6 Medium
supplier Certificates of analysis
Section 4.2
Questions that the auditor should ask and that the company should be able to reply to:
• Who are members of the product fraud assessment team?
• How members of the product assessment team have been trained?
• Are the responsibilities of the product fraud assessment team clearly defined?
• How does senior management support the product fraud assessment team?
• How are data sources relating to product fraud identified?
• Is there a list of data sources with information relating to its review and frequency of review?
• Are credible data sources used?
• How are the data used by the members of the product fraud assessment team ?
Documents that the auditor may wish to assess
• Training records of product fraud assessment team
• List of information and data sources
• Evidence for the regular review of information and data sources
Section 4.3
Questions that the auditor should ask and that the company should be able to reply to:
• Which is the defined vulnerability assessment methodology?
• Which risk factors are defined for product (raw material, ingredient and packaging) and suppliers?
• Are all raw materials, ingredients and packaging subject to vulnerability assessment?
• Are vulnerability scores, ranking or grading available for review?
• How often are vulnerability assessments undertaken?
• Are vulnerability assessments undertaken on all new raw material, ingredient and packaging and
the suppliers of these product?
Documents that the auditor may wish to assess
• Vulnerability assessment records
• List of raw materials, ingredients and packaging and their suppliers.
• Results of internal audit review
Section 4.6
Questions that the auditor should ask and that the company should be able to reply to:
• How often is a vulnerability assessment undertaken?
• Is there, within the food fraud mitigation plan procedure, criteria defined when the food fraud
vulnerability assessment shall be reviewed in additional to the annual review, i.e. when changes
to risk could occur?
• Is the effectiveness of the food fraud mitigation plan reviewed? If so how is this undertaken?
• Are control and monitoring requirements changed, and if so, why?
Documents that the auditor may wish to assess
• Product Fraud Mitigation Plan procedures
• Product Fraud Mitigation Plan control measures, records and review (and actions)
• Customer and consumers Complaints
• Results of internal audit
IMPRINT
Contact and Informations:
© IFS, 2018