You are on page 1of 8

Part 3 FOOD SAFETY MANAGEMENT SYSTEM ISO 22000:2005

To Ensure Integrity of Food Supply Chain

1. AIM:-
I. Control food safety hazards in order to consistently provide safe end products
that meet both requirements agreed with the customer and those of applicable
food safety regulation.
II. Enhance customer satisfaction through the effective control of food safety
hazards.

2. APPLICABILITY: - all type of organisations within the food chain (Farm to fork)

- Feed producers
- Primary producers
- Food Manufacturers
- Transport and storage operators
- Subcontractors
- Retail and food service outlets (Hotels and caterers)
- Manufacturers of Equipment, packing material, cleaning agents& Additives,
Ingredients.

3. FOOD SAFETY: - Preventing food borne hazards at the point of consumption

4. METHODOLOGY: - Combine HACCP plans and pre requisite programmes


(PRPs) to ensure hazard control. PRPs are further divided into infrastructure and
maintenance (PRPs) and operational PRPs. Identify the risks evaluate the risks and
take action. Keep improving through verification of effectiveness.

5. BENEFITS:-
 Increased Due Diligence
 More Efficient And Dynamic Food Safety Hazard Control
 All Control Measures Subjected To Hazard Analysis
 Fill The Gap Between ISO 9001:2000 And HACCP.
 System Approach Rather Than Product Approach.
 Covers the entire Food chain.
 Make the organization ready to meet the requirements of new FOOD SAFETY
ACT.
 Easier to meet the new food safety bill requirements
 Better traceability

6. STEPS IN IMPLEMENTATION
1. Training of top management
2. Identification of FOOD SAFETY POLICY AND OBJECTIVES
3. Formation of inter disciplinary FOOD SAFETY TEAM & appointment of Team
Leader.
4. Development of documentation of the Quality Manual, Food Safety Manual and
procedures. ( Including the following lower level documents )

i. Emergency preparedness and response plan


ii. Product description including raw materials ingredients and food
contact materials [also covering statutory & regulatory requirements]
iii. Prerequisite Programmes (PRP)
iv. Quality Plan
v. Flow diagram, process steps, control measures, traceability system
vi. Hazard assessment
vii. Selection and assessment of control measures
viii. HACCP Plan
ix. Operational Prerequisite programmes
x. Withdrawal programme(Product recall procedure)
xi. Formats

5. Training of Internal Auditors.


6. Implementation of the system
7. Internal Audits (Food Safety) as per the system and follow up activities
8. Management Review Meetings
9. Pre-assessment audit by third party auditor
10. Audit of third party auditor and clearance of certification audit in two phases
10.1 Pre assessment
10.2 Certification (valid for three years)
Part 4 INFORMATION SECURITY MANAGEMENT SYSTEM
(ISMS) ISO 27001

1) AIM: - A comprehensive information security management system (ISMS)


plays a critical role in ensuring the ability of your organization to successfully
face information security threats from a wide range of sources and continue your
operations. It is so due to the present day trend of paperless office and businesses
being too dependent on internet/e-mail communication/wide area networks etc.
Being online can sometimes be a nightmare. The sources of these threats may
include sabotage, espionage, vandalism, fraud, hacking etc (remember the
Gurgaon or the Bangalore BPO: Bank fraud cases?)

The standard ISO 27001 lays down the principal elements and policies of the
organization’s information security system. These include risk assessment and
management, objectives for control of information security practices and
business continuity management processes. The standard also seeks the
organization to establish a set of comprehensive and balanced system of
measurements to monitor and review the performance of information security
management system. The risk management and business continuity management
form the most important elements of the standard. These help the management to
determine the priorities for managing information security risks and identify
appropriate actions to address these risks and to meet the requirements and
expectations of interested parties.

2) BENEFITS

 Commitment: certification serves as a guarantee of the effectiveness of the


effort put into rendering the organization secure at all levels, and demonstrates
the due diligence of its administrators.
 Compliance: certification demonstrates to competent authorities that the
organization observes all applicable laws and regulations & contractual
requirements.
 Risk management: leads to a better knowledge of information systems, their
weaknesses and how to protect them. Equally, it ensures a more dependable
availability of both hardware and data.
 Credibility and confidence: Partners, Shareholders and Customers are
reassured when they see the importance afforded by the organization to
protecting information. Certification can help set apart a company from its
competitors and in the marketplace
 Reduced costs related to information security breaches, and possible reduction
in insurance premiums.
 Improves employee awareness of information related issues and their
responsibilities within the organization.
 Better Business continuity and recovery from emergency situations so as to
meet SLAs
3) SUMMARY OF THE STANDARD [CONTROL OBJECTIVES]

I. Information security policy


Provide management direction and support for information security. Defines
corporate objectives for information security

II. IT security organisation & 3rd party connections


Manage information security within the company. Maintain the security of
organizational information processing facilities and information assets accessed by
3rd parties (suppliers, partners, customers).
Maintain the security of information when the responsibility for information
processing has been outsourced to another organization.

III. Assets classification and control


Determine and maintain appropriate protection of corporate assets.

IV. Personnel security


Reduce risks of human error, theft, fraud or misuse of facilities. Ensure that users are
aware of information security threats and concerns, and are equipped to support the
corporate security policy in the course of their normal work. Minimize the damage
from security incidents and malfunctions and learn from such incidents.

V. Physical & environmental security


Prevent unauthorised access, damage and interference to business premises and
information. Prevent loss, damage or compromise of assets and interruption to
business activities. Prevent compromise or theft of information and information
processing facilities.

VI. Computer & network management


Ensure the correct and secure operation of information processing facilities.
Minimise the risk of systems failures. Protect the integrity of software and
information.
Maintain the integrity and availability of information processing and
communications.
Ensure the safeguarding of information in networks and the protection of the
supporting infrastructure.
Prevent damage to assets and interruptions to business activities. Prevent loss,
modification or misuse of information exchanged between organizations.
VII. System access control
Control access to information. Prevent unauthorized access to information systems.
Ensure the protection of networked services. Prevent unauthorized computer access.
Detect unauthorised activities. Ensure information security when using mobile
computing and teleworking facilities.
VIII. System development & maintenance
Ensure security is built into operational systems. Prevent loss, modification or
misuse of user data in application systems. Protect the confidentiality, authenticity
and integrity of information. Ensure IT projects and support activities are conducted
in a secure manner. Maintain the security of application system software and data.
IX. Business continuity planning
Counteract or prevent interruptions to business activities and to critical business
processes from the effects of major failures or disasters.
X. Compliance
Avoid breaches of any criminal or civil law, statutory, regulatory or contractual
obligations and of any security requirements.
Ensure systems security parameters, operating procedures etc. comply with
organisational security policies and standards.
Maximize the effectiveness of and to minimize interference to/from the system audit
process.
4) STEPS IN IMPLEMENTATION OF ISMS
1. Training of top management
2. Identification of ISMS POLICY AND OBJECTIVES
3. Awareness training to all employees
4. Development of documentation ISMS DOCUMENTS
i. Identification of information assets
ii. Risk assessment methodology [ including legal & contractual
requirements]
iii. Risk assessment
iv. Defining the scope of ISMS
v. Identifying the appropriate control objectives and controls
vi. Statement of applicability
vii. Risk treatment plan
viii. Procedures as per ISMS
ix. Business continuity Plan
x. Formats
5. Training of Internal Auditors.
6. Implementation of the documented system
7. Internal Audits (ISMS) as per the system and follow up activities
8. Management Review Meetings
9. Pre-assessment audit by third party auditor
10. Audit of third party auditor and clearance of certification audit in two phases
10.1 Pre assessment
10.2 Certification (valid for three years)

SA8000
SA8000 is a global social accountability standard for decent working conditions,
developed and overseen by Social Accountability International (SAI). Detailed
guidance for implementing or auditing to SA8000 is available from its website. SAI
offers training in SA8000 and other workplace standards to managers, workers and
auditors. It also operates an accreditation agency that licenses and oversees auditing
organizations to ward certification to employers that comply with SA8000.
Basis
SA8000 is based on the UN Universal Declaration of Human Rights, Convention on
the Rights of the Child and various International Labour Organization (ILO)
conventions. SA8000 covers the following areas of accountability:
Child labour
Forced labour
Workplace safety and health
The right to organize
Discrimination
Workplace discipline
Working hours
Wages
Management system for Human Resources
Corporate social responsibility

Respect for human rights


Fair treatment for the workforce
Protecting the environment
Ethical behaviour of the organization
Being a good neighbour

Details of the standard

The first global standard for ethical sourcing


Designed for independent verificationA global standard, designed for use by any
company, anywhere in the worldHas been developed with stakeholders Is designed
to take local laws and requirements into account

Certifications

More than 640,000 workers are employed in 1200 facilities certified to SA8000, in 60
countries and 70 industrial sectors. The industrial sectors with the most certifications
include apparel and textiles; building materials; agriculture; construction; chemicals;
cosmetics; cleaning services and transportation. The countries with the most
certification to SA8000 include Brazil, India, China and Italy.
The cost of acquiring a certification for a factory, farm or office varies with the number of
employees and the location. It can range up to 10-12,000 USD for large facilities.

Significance

Dominic A. Tarantino, Chairman of Price Waterhouse World Firm described SA8000 in 1998
as "the first ever universal standard for ethical sourcing... It provides a common framework
for ethical sourcing for companies of any size and any type, anywhere in the world. SA8000
sets out provisions for issues such as trade union rights, the use of child labor, working hours,
health and safety at work, and fair pay." However, it does not address broader issues of
ecology or bribery or other issues which may require more consumer or executive restraint.
Tarantino further argued the need for moral leadership: Pricing, products and services are
no longer the sole arbiters of commercial success... it is business that must take the
lead in taming the global frontier. Business must take the lead in establishing rule of
law in emerging markets. Business must take the lead in stopping bribery. Business
must take the lead in bringing order to cyberspace. Business must take the lead in
ensuring that technology does not split the world into haves and have nots."

1. Benefits Fewer accidents


2. Enhanced opportunities to be organized
3. A way to address and improve the conditions where people work
4. Increased worker awareness about core labor rights
5. Enhanced communication to the management
6. Evidence that labor rights are good for society and business
7. Improved business practices lead to economic growth and new job
opportunitiesA credible and effective way to put social responsability into action
8. Enhanced company and brand reputation
9. Improved employee recruitment, retention and performance
10. Gains in quality and productivity
11. Savings from fewer workdays lost and lower insurance bills
12. Less expensive than an internal compliance program
13. Better relationships among workers, trade unions, companies, customers, NGOs
and government

14. Clear, credible information for those who want to make ethical purchasng
decisions
15. Useful data for socially responsible investors
16. Identification of products made under humane conditions
17. Identification of companies making progress toward humane conditions
18. Broad coverage of product categories and production geography

Why to implement SA8000


To differentiate and offer value to customers.

Driven by commitment to provide safe workplaces.

Set a global standard that complies with all local laws and customs.

You might also like