You are on page 1of 13

The Relationship of Biosecurity

to Sanitation 2

Abstract
Knowledge of the threat of bioterrorism in food processing and prepara-
tion is essential to the maintenance of a safe food supply. The US
Department of Agriculture (USDA) has provided some beneficial guide-
lines for the processing, storage, and protection against bioterrorism, and
the Food and Drug Administration (FDA) has implemented guidelines for
enforcement of the Bioterrorism Act. The development of a functional
food defense plan that is developed, implemented, tested, reviewed, and
maintained is the cornerstone of a food defense program.
Since pest management is an integral part of food security, the training
of pest management personnel is a viable method to improve food safety
through monitoring the premises for indications of bioterrorism.
Biosecurity and pest management personnel should collaborate to create a
set of common goals and training opportunities. The FDA and USDA have
websites for the food industry that includes an extensive amount of infor-
mation about biosecurity including food defense plans, risk mitigation
tools, and a food defense plan builder.

Keywords
Biosecurity • Bioterrorism • Cybersecurity • Food defense plan • FDA •
Records • RFID • Security • Traceability

Cybersecurity best practices should include a


Introduction security assessment to establish security gaps and
determine potential risks to deal with business
The food industry is susceptible to cybersecurity operations (Straka 2014). Security gaps may
threats, like all other industries. Therefore, a com- include weak security configurations, outdated
prehensive cybersecurity plan that complies with firewalls, insecure remote access, operating sys-
company objectives and federal and state govern- tem flaws, lack of staff training, flawed security
ment regulations is essential for protection. policies, and negligence. Some basic practices to

© Springer International Publishing AG, part of Springer Nature 2018 19


N.G. Marriott et al., Principles of Food Sanitation, Food Science Text Series,
https://doi.org/10.1007/978-3-319-67166-6_2
20 2  The Relationship of Biosecurity to Sanitation

address cybersecurity are establishing a plan to chemical weapons was intensified. After the ter-
eliminate significant vulnerabilities, developing rorism events of 2001 in the United States, bio-
systems to identify and prevent potential attacks, terrorism became a key security issue and
updating of authorized application software, and necessitated that the food industry take this issue
creating an incident response plan prior to the very seriously. Since 2003, food plants have
occurrence of any incidents. been encouraged by the USDA and the Food and
Agroterrorism, the intentional contamination Drug Administration to implement food defense
of the food supply with a goal of terrorizing the plans in order to minimize the potential risks of
population and causing harm, is an increasing foodborne bioterrorism. The FDA and USDA
risk. The food industry has become aware of the have provided resources to make this feasible for
importance of addressing threats to food safety food production and processing facilities. In
from foodborne disease outbreaks and inadvertent 2016, a final rule was instituted under the Food
contaminations to isolated occurrences of product Safety Modernization Act (FSMA) that requires
extortion and tampering. However, the food indus- all food plants registered with FDA to develop a
try must now guard against the intentional, wide- food defense plan.
spread contamination of the food supply. Food
biosecurity is no longer addressed in hypothetical
terms as the potential for the food supply being a  otential Risks of Foodborne
P
target or tool of terrorism. Furthermore, optimism Bioterrorism
and complacency are no longer a viable option.
Food biosecurity training and a food defense After terrorist attacks in the United States during
plan are essential components for a food plant to 2001, a scenario pondered by individuals was
help maintain a safe food supply. Food sanitari- reminiscent of the anthrax letters scare during
ans and other employees involved with sanitation 2001 and the Tylenol-laced cyanide of the early
must be knowledgeable about food contaminants 1980s. DeSorbo (2004) reported that less than a
including microorganisms, allergens, physical month after being hired, four employees mysteri-
hazards, pests, and contamination through bioter- ously disappeared from a dairy plant in California
rorism. The food industry is vulnerable to threats and became wanted in connection with an
and possible damage to food, which makes it Al-Qaeda-backed attack and subsequent botu-
important for food plants to have a functional lism outbreak that killed 800 and caused more
food defense plan that includes sanitation. than 16,000 to become ill. The scenario was con-
In 2003, the US Homeland Security Secretary tinued 3 weeks after the attack. Recalls of dairy
indicated the possibility that terrorists may select products manufactured by the California firm
popular food products to deliver chemical or bio- reduced the impact of the botulism outbreak with
logical warfare. Thus, it is essential to protect subsequent dairy shortages being reported
consumers from bioterrorism in addition to acci- throughout Southern California. Other possible
dental infestations or contamination from inade- threat agents are hemorrhagic fever viruses, ricin
quate sanitation. Now, it is necessary for the food toxin, and botulinum toxin.
industry to protect against intentional interfer- According to Applebaum (2004), the food
ence and the possibility that food products could industry has focused on three areas that are
be used as weapons of destruction. referred to as the “three Ps” of protection:
The food industry has previously faced bios-
ecurity challenges. During the 1980s, a major Personnel: Food companies have increased
security challenge increased emphasis on main- employee screening and supervision.
taining a drug-free workplace. In the last decade Product: Food companies have established addi-
of the twentieth century, there was an increased tional controls for ingredients and products
emphasis on preventing workplace violence. during receiving, production, and distribution,
During this time, the threat of biological and to ensure a high level of food safety.
Bioterrorism Protection Measures 21

Property: Food companies have established addi- minimize and, if possible, eliminate the threat of
tional controls to ensure that they have the international contamination of the food supply.
highest barriers in place to guard against pos- To ensure successful security efforts, food
sible intruders. companies should establish a “security mental-
ity” through increased knowledge of security,
Applebaum (2004) further stated that the cri- security needs, and the establishment of security
teria for accurate risk assessment are to evaluate priorities. They should review their current secu-
a firm’s assets and determine the type of potential rity practices and procedures, crisis management,
threat that exists and the establishment’s vulner- and security program (if such programs exist) to
abilities. This author further stated that where a determine what revisions or additions are needed.
company’s assets and vulnerabilities overlap Applebaum (2004) has suggested that “food
with potential threats, the risk of bioterrorism is security” and “food safety” are not the same.
increased. Although risk cannot be eliminated Food safety addresses accidents such as cross-­
totally, it is essential to apply risk management to contamination and process failure during produc-
ensure deterrence and prevention and to apply the tion, whereas food security is a broader issue
“prevent to protect” policy. Since food compa- which can include intentional manipulating of the
nies cannot completely prevent bioterrorism food supply to damage it or make it too hazardous
before it occurs, they must have the knowledge for consumption. Thus, food security addresses
and tools to detect and mitigate any possible hazards are induced deliberately and intention-
biosecurity breaches. Thus, the goal is to detect ally and food safety addresses hazards that may
problems before it is necessary to mitigate their occur unplanned and accidentally. Both of these
potential impact. activities have a common goal, which is to pre-
vent problems that could undermine the safety of
food products. Although the food industry must
Bioterrorism Protection Measures accept the responsibility of providing consumers
a secure food supply, biosecurity should not
The US food industry has the responsibility of impede food production, distribution, and con-
ensuring that approximately 400,000 domestic and sumption. Thus, changes either to food industry
foreign facilities that manufacture, process, pack- security activities or to the regulations governing
age, or store food for human or animal consump- food security should be realistic and workable.
tion are properly registered with the FDA and that
all companies that export food products or ingredi-
ents to the United States are meeting the prior Radio-Frequency Identification
notice requirements established by the Bioterrorism
Act. The Bioterrorism Act directed the FDA to An important component of compliance with
implement regulations for the registration of food industry regulations such as the FSMA is data
facilities; prior notice of imported food shipments; collection to access and utilize information to
the establishment, maintenance, and availability of trace products throughout the food supply
records; and the administrative detention of food chain. Radio-­frequency identification (RFID) is
for human or animal consumption. a technology that provides an opportunity to get
The food industry has been especially active as close as possible to real-time traceability in
in the review of existing food security programs the food supply chain. A large retailer has man-
and the implementation of preventive measures dated that the larger vendors provide products
and effective controls—especially after the US tagged with RFID for products at the case and
terrorist attacks of 2001. Progressive companies pallet levels. The utility of this technique is that
in the United States and other countries have RFID recordkeeping builds long-term data
increased their commitment and vigilance to records that benchmark supply deficiencies and
ensure that preventive measures are in place to provide traceability.
22 2  The Relationship of Biosecurity to Sanitation

RFID provides records for supply chain devia- own operations are integrated into a larger sys-
tion and necessary corrective actions. Through tem of external data exchange and business pro-
low-power radio waves, information is transmit- cesses that occur between trading partners.
ted instantly from specialty RFID tags to the Enabling whole-chain traceability involves link-
reader. Passive, ultrahigh-frequency tags are the ing internal proprietary traceability systems with
most commonly utilized (O’Boyle 2016). These external systems through the use of one global
tags are capable of tracking large volumes such as language of business—the GS1 system of stan-
bins or pallets with a continuous flow. Active or dards—across the entire supply chain. GS1 stan-
Wi-Fi-based tags draw from their own internal dards enable trading partners in the supply chain
power supply to transmit signals to standard wire- to communicate with each other through the
less access points. This concept provides real- identification encoded in the various bar codes.
time location information for tracking high-­value, According to Fernandez (2015), whole-chain
mobile assets. Active tags are more expensive traceability can have the following positive
than passive tags but have a greater read range of impacts on the food supply chain:
up to 90 m (300 ft). Bluetooth low-­energy tags are
less expensive than active tags and are easier to 1. Precise location of potentially harmful prod-
deploy since all they require is a connection to a ucts through supply chain visibility—the most
Bluetooth-enabled device such as a smartphone critical piece of traceability.
or mobile computer. This device permits the man- 2. Ensuring trustworthy product information and
ufacturer to obtain the same real-­time location data quality—by the involvement of industry
information as with a Wi-Fi/active tag, but with- leaders to identify challenges and develop
out the need for new infrastructure or multiple potential solutions for more efficiencies and
access points. Hybrid RFID systems that combine enhanced risk management.
active and passive technology offer the potential 3. Reduced food waste-adopting standard-based
for food manufacturers to track both high-volume traceability procedures will enhance more
and low-cost assets. According to O’Boyle (2016), precise inventory planning.
new hybrid systems provide a unified visibility 4. Operational efficiency enhancement—better

solution for tracking all types of assets and offer collaboration with external trading partners
more flexibility and affordability. and improved internal gains.

Traceability is an essential component of a


Traceability proactive retrieval of lots implicated in a poten-
tial or confirmed pathogen detection event.
Traceability is the ability to verify the identity, Tracking lot-associated data over time can also
history, or location of an item through docu- lead to the identification of patterns that affect
mented information as it moves through the sup- quality, profitability, and safety. Data-rich inter-
ply chain. A traceability study conducted by the nal traceability can capture the specific timing of
US Department of Health and Human Services key transfers and movements from production
revealed that only 5 of 40 food items purchased through shipment.
for the investigation could actually have all of The FDA traceback methods have become
their individual ingredients traced back through more refined (Karas 2014). The agency has
the supply chain to their origin. offered training for its staff and members of state
Fernandez (2015) suggested that the food and local agencies to provide more insight on the
industry needs improved collaboration and a techniques and methods that have been devel-
more holistic (or “whole-chain”) approach to the oped and standardized. Interim final rules for the
food supply chain to better track and trace food. registration of food facilities and prior notice of
Whole-chain traceability is achieved when a imported food shipments were issued by the FDA
firm’s internal data and processes used within its and became effective on December 12, 2003.
Bioterrorism Protection Measures 23

One of the purposes of FSMA’s development systems electronically without the need for
was to improve food product tracing. The identi- manual data entry, leading to a more com-
fication of a common food as the vehicle for a plete, accurate, and real-time data needed for
foodborne illness can prevent the specific food or effective traceability and root cause analysis
ingredient from entering the food supply. Thus, 5. Involve multiple tiers of suppliers—this level
traceback can be used to identify the sources of of visibility for key ingredients is essential in
ingredients as the contamination source. the global marketplace.
There are links in the food supply chain that
differ in requirements for data capture, record-
ing, and retrieval. An example is core transac- Biosecurity Through Simulation
tional business (CTE) processes that include
receipt of bulk materials, ingredients, and Although the food industry must accept the
packaging. Technology systems are available responsibility for the maintenance of biosecurity,
that include enterprise resource planning (ERP) the ability to test the effectiveness of preventive
software. However, not every available ERP and reactive procedures to an act of bioterrorism
includes an industry-specific functionality. remains a challenge. Role-playing and simula-
Angus-Lee (2014–2015) suggested that to tion can assist with the assessment of the value of
reduce the cost, risk, and time involved in biosecurity programs. Simulation has been devel-
implementation, companies should seek the oped by academia for such an assessment
best-in-breed software that can effectively meet (Reckowsky 2004). The intent of this technique
the requirements of the user. has been to provide companies an opportunity to
Suppliers should assign a batch-lot number test their security plans on a realistic scenario in
for case-level traceability. A serial number can be conjunction with the pressures of time, publicity,
included in addition to the batch-lot number as a and finances. Most decisions involved with simu-
more specific product identifier within the batch-­ lation were based on information received from
lot. The serial number will indicate what is in the multiple inputs such as government releases,
container and other containers that receive its media relations, and communications between
own dedicated serial number. each other. Effective communication enhanced
Suslow (2009) suggested the following key the traceback of contaminated products and
ingredients to successful quality-based traceability: ingredients. Participants have been optimistic
about role-playing and simulation and consider
1. Integrate quality and traceability data—an inte- this approach to be vital to the increase of indus-
grated quality-based traceability system mar- try awareness and readiness for a bioterrorism
ries lot- and batch-level traceability information attack. It appears that simulation can be utilized
with all required quality documentation. to advance preparedness and strengthen decision-­
2. Involve suppliers with an on-line system— making abilities related to biosecurity threats.
this access to current specifications, test pro- One tool that can be used to help companies use
cedures, non-conformances, and audits, as simulation to evaluate the effectiveness of their
well as transaction-based electronic certifi- food defense plan is the Food Defense and Recall
cates of analysis (e-COA), provides the con- Preparedness: A Scenario-Based Exercise Tool
trol needed for a complete system. that is provided by the USDA (2016).
3. Automate COA validation—suppliers can

provide shipment and e-COA data electroni-
cally where test data is immediately validated Biosecurity Guidelines
prior to shipment.
4. Eliminate manual entry of data—data can be Guidelines for Biosecurity and food defense
collected from suppliers and multiple internal plans are provided by the US Department of
24 2  The Relationship of Biosecurity to Sanitation

Agriculture, Food Safety Inspection Service, and The following screening and educating mea-
the US Food and Drug Administration (USDA sures should be considered:
2016 and FDA 2016) and are listed below:
1. Appropriate background and criminal checks
1 . Organize a food defense team. should be conducted.
2. Develop a comprehensive transportation and 2. References should be verified for all potential
storage security plan. employers.
3. Assess and identify viable locations for con- 3. Personnel without background checks should
tamination throughout the production and dis- be under constant supervision, and their
tribution process by the use of a flow diagram. access to sensitive areas of the facility should
4. Identify and implement controls to prevent be restricted.
product adulteration or contamination during 4. Employees should be trained on food produc-
processing, storage, and transportation. tion practices and vigilance, specifically how
5. Provide a method to identify and track food to prevent, detect, and respond to threats of
products during storage and distribution terrorist actions.
including the use of tamper-resistant seals. 5. Ongoing promotion of security consciousness
6. Verify that contract transporters and storage and the importance of security procedures
facilities have a security program in effect. should be practiced.
6. Appropriate personnel should be trained in
According to the US Department of security procedures for incoming mail, sup-
Agriculture, security measures for purchasing plies, raw materials, and other deliveries.
and distribution include: 7. Employees should be encouraged to report
any suspicious activities, such as signs of pos-
1. Procedures for the immediate recall of unsafe sible product tampering or breaks in the food
products security system.
2. Procedures for handling biosecurity or other 8. Ensure that employs know emergency proce-
threats and an evacuation plan dures and contact information.
3. Appropriate handling, separation, and dis-
posal of unsafe products The following security measures are appropriate:
4. Documentation method for the handling of
both safe and unsafe products 1. A positive ID system should be required for
5. Documented instructions for the rejection of all employees.
unsafe material 2. Visitors should be escorted at all times
6. Procedures for the handling of off-hour throughout the facility.
deliveries 3. When a staff member is no longer employed,
7. Current list of contacts for local, state, fed- company-issued IDs and keys should be col-
eral, Homeland Security, and public health lected and lock combinations changed.
officials 4. Restricted access to facilities, transportation
8. Procedures for the notification of appropriate vehicles, locker rooms, and all storage areas
authorities if the need materializes is essential.
9. Notification of all entry and exit points avail- 5. Specific entry and exit points for people and
able during an emergency vehicles should be designated.
10. Strategy for communication of beneficial
6. All access and exit doors, vent openings,
information to the news media windows, outside refrigeration and storage
11. Appropriate training of biosecurity team
units, trailer bodies, and bulk storage tanks
members should be secured.
12. Periodic conduct of practice drills and review 7. Access to the water supply and airflow sys-
of security measures tems should be secured and restricted.
Bioterrorism Protection Measures 25

8. Adequate light should be provided in the 25. Employees should be aware of and report any
perimeter areas. suspicious activity to appropriate authorities.
9. Incoming mail should be handled in an area 26. Forward-shippers and backward-retailers,

of the facility separate from food handling. wholesalers, carriers, and others should be
10. Employees should be monitored for unusual traced anterior should have systems in place
behavior (e.g., staying unusually late, arriv- for quickly and effectively locating products
ing unusually early, taking pictures of the that had been distributed.
establishment, or moving company docu- 27. Threats or reports of suspicious activity

ments from the facility). should be investigated promptly.
11. All food ingredients, products, and packag- 28. If a food security emergency occurs, the local
ing materials should be purchased only from law enforcement agency should be contacted.
known, reputable suppliers with accompany-
ing letters of guaranty. The US Department of Agriculture suggests
12. Advance notification from suppliers for all the following precautions to address biosecurity
incoming deliveries, including shipment on the outside of food plants:
details, driver’s name, and seal numbers,
should be required. 1. Plant boundaries should be secured to pre-
13. Locked or sealed vehicles for delivery should vent unauthorized entry.
be required. 2. “No trespassing” signs should be posted.
14. Products known or suspected of being adul- 3. Integrity of the plant perimeter should be
terated should be rejected. monitored for signs of suspicious activity or
15. Unscheduled deliveries should be retained an unauthorized entry.
outside of the premises pending verification 4. Outside lighting should be sufficient to per-
of the shipper and cargo. mit detection of unusual activities.
16. A supervisor or other agent should be
5. Establishment entrances should be secured
required to break seals and sign off in the through guards, alarms, cameras, or other
trucker’s logbook, noting on the bill of lad- security hardware consistent with national
ing any problems with product condition. and local fire and safety codes.
17. The broker, seal numbers, and truck or trailer 6. Emergency exits should be alarmed and have
number should be documented. the self-locking doors that can be opened
18. A plan should exist to ensure product integ- only from the inside.
rity when a seal has to be broken prior to 7. Doors, windows, roof openings, vent open-
delivery due to multiple deliveries or for ings, trader bodies, railcars, and bulk storage
inspection by government officials. tanks should be secured at all times.
19. Unloading of incoming products should be 8. Outside storage tanks for hazardous materi-
supervised. als and potable water supply should be pro-
20. Inbound deliveries should be verified for seal tected from, and monitored for, unauthorized
integrity, seal number, and shipping location. access.
21. Incoming products and their containers
9. A current list of plant personnel with open or
should be examined for evidence of tamper- restricted access to the establishment should
ing all or a corporation. be maintained at the security office.
22. Foods should be checked for unusual color 10. Establishment entry should be controlled

or appearance. through required positive identification (e.g.,
23. A procedural checklist for incoming and out- picture IDs, sign-in and sign-out at security
going shipments should be developed. or reception, etc.).
24. All outgoing shipments should be sealed
11. Incoming or outgoing vehicles (both private
with tamper-evident numbered seals with and commercial) should be inspected for
notation on the shipping documents. unusual cargo or activity.
26 2  The Relationship of Biosecurity to Sanitation

12. Parking areas for visitors and guests should The Food Safety Modernization Act
be identified and located at a safe distance
from the main facility. The FDA Food Safety Modernization Act was
13. Deliveries should be verified against a sched- signed into law by President Obama on January
uled roster. 4, 2011, with the objective of ensuring that the
14. Unscheduled deliveries should be retained US food supply is safe by shifting the focus of
outside the plant premises, if possible, federal regulators from responding to contamina-
pending verification of shipper and tion to preventing contamination.
cargo. FSMA specifies a final rule “Focused
15. Outside access to wells, potable water
Mitigation Strategies to Protect Food Against
tanks, and ice-making equipment and stor- Intentional Adulteration” (Agres 2014; FDA
age should be secured from unauthorized 2016). This foundational rule specifies that all
entry. domestic and foreign facilities that are registered
16. Potable and non-potable water lines into pro- under Section 415 of Code of Federal Regulations
cessing areas should be inspected periodi- under the Federal Food, Drug, and Cosmetic Act
cally for possible hampering. will be required to review the four activities that
17. The establishment should arrange for imme- are the most vulnerable to intentional adultera-
diate notification of local health officials in tion. These four activities include (1) bulk liquid
the event the potability of the public water receiving and unloading, (2) liquid storage, and
supply is compromised. holding, (3) mixing and combining food ingredi-
18. The establishment should determine and
ents together, and (4) ingredient handling. This
enforce a policy on which personal items adoption is very similar to using Hazard Analysis
may and may not be permitted inside the and Critical Control Points (HACCP) to prevent
plant and within production areas. food safety issues in the meat and poultry indus-
tries including, biological, chemical, and physi-
The recommended biosecurity precautions cal contamination. FSMA states that companies
provided by the US Department of Agriculture must prepare a food defense plan, conduct train-
for the inside of food establishments include: ing, take and monitor corrective actions, and
maintain records of documentation.
1. Restricted areas inside the plant should be (1) Bulk liquid receiving and loading activi-
clearly marked and secured. ties include process steps where a liquid ingredi-
2. Access to central controls for airflow, water ent is being received and unloaded at a facility or
systems, electricity, and gas should be loaded into an outbound transport vehicle. This
restricted and controlled. activity type incorporates the actions of opening
3. Current flat layout schematics should be avail- the transport vehicle, attaching any pumping
able at strategic and secured locations within equipment or hoses, and opening any venting
the plant. hatches. (2) Bulk liquid storage and non-bulk
4. Airflow systems should include a provision liquid holding and surge tanks often involve
for immediate isolation of contaminated areas agitation and may be located in isolated areas
or rooms. of the facility allowing access and dispersion of
5. Emergency alert equipment should be fully a contaminant. Access hatches may not be
operational, and the location of controls locked or alarmed. With regard to surge tanks in
should be clearly marked. the production area, there may not be lids present
6. Access to in-plant laboratories should be
or locking hatches to limit accessibility to the liq-
controlled. uid ingredient or product. (3) Coating, mixing,
7. Computer data processing should be protected grinding, and rework activities may allow for
using passwords, network firewalls, and effec- even distribution of a contaminant. The effect
tive and current virus detection systems. of any of these processes is that an agent added to
Food Defense Team 27

the process could be evenly mixed throughout the implemented at the facility. Broad mitigation
product batch, contaminating the total servings strategies include procedures implemented to
produced from the contaminated batch, and secure the facility, storage areas, shipping and
includes but is not limited to mixers, blenders, receiving areas, utilities, and personnel. Focused
homogenizers, cascade breeders, millers, grind- mitigation strategies provide an additional level
ers, pulverizers, etc. (4) Ingredient staging, of security to those vulnerable areas within food
preparation, and addition activities are open processing or production steps that are inherently
process steps that may provide a point of open to direct human contact. Food defense plans
access to introduce a contaminant into the and food safety plans may overlap and can even
product stream. be combined into a single plan. In some cases,
The six other foundational rules implemented food defense measures may overlap with prac-
under FSMA include (1) Current Good tices in a firm’s sanitation standard operating pro-
Manufacturing Practice and Hazard Analysis and cedures (SSOPs) and HACCP. In these cases,
Risk-Based Preventive Controls for Human there is no need to recreate something that is
Food; (2) Standards for the Growing, Harvesting, already in place when developing a food defense
Packing, and Holding of Produce for Human plan. Food defense plans will differ from facility
Consumption; (3) Current Good Manufacturing to facility according to the food defense training
Practice and Hazard Analysis and Risk-Based 101 at FDA (2016), but all plans should include
Preventive Controls for Food for Animals; (4) certain elements including:
Foreign Supplier Verification Programs (FSVP)
for Importers of Food for Humans and Animals; 1. Company information.
(5) Accreditation of Third-Party Auditors/ 2. Broad mitigation strategies and action plans.
Certification Bodies to Conduct Food Safety 3. Vulnerability assessments and focused miti-
Audits and to Issue Certifications; and (6) gation strategies.
Sanitary Transport of Human and Animal Food 4. Plan reassessment procedures.
(FDA 2016). 5. Contact information for response plan.
6. Process steps that have been identified in the
vulnerability assessment as critical process
Food Defense Plan steps should be identified in the food defense
plan. Those process steps that are determined
A food defense plan is required for all food com- as critical and pose a threat to intentional con-
panies that are registered under Section 415 of tamination should be identified, similar to
the Code of Federal Regulations (CFR) under the how HACCP plans identify the critical control
Federal Food, Drug, and Cosmetic Act. The FDA points for unintentional contamination in the
has a food defense plan builder (FDA 2016) that food process.
can help plants develop their food defense plan. 7. Focused mitigation strategies employed at the
Many of the items listed in the Biosecurity facility to minimize or eliminate vulnerabili-
Guidelines sections can be included in a food ties at the critical process steps of the food
defense plan. A food defense plan is a written facility should be documented in the food
plan used to record and document the practices defense plan.
implemented at a facility to control/minimize the
potential for intentional contamination.
The basic elements of a food defense plan Food Defense Team
include (1) assessment of the broad mitigation
strategies currently implemented at the facility, According to FDA (2016), the roles and the
(2) action items resulting from the broad mitiga- responsibilities of a food defense team are:
tion assessment, (3) vulnerability assessment and
the critical process steps identified, and (4) 1. Conduct evaluations of the broad mitigation
focused mitigation strategies selected to be strategies established at the facility.
28 2  The Relationship of Biosecurity to Sanitation

2. Develop action items to address gaps identified Employee Responsibilities  Employees should
in the broad mitigation strategy assessment. be aware of and trained in food defense proce-
3. Conduct vulnerability assessments for each dures. Supervisors need to provide leadership to
food (or food group) process and identify the frontline employees to help them implement mit-
critical steps of each process igation strategies and food defense procedures. In
4. Implement mitigation strategies to minimize addition, employees should receive training on
the vulnerabilities identified at the critical pro- food defense and their responsibilities in the food
cess steps. defense plan. All employees need to know (1)
5. Document the assessments, vulnerabilities,
suspicious activities that should be reported, (2)
and mitigation strategies and any food defense the appropriate person(s) to report suspicious
policies or procedures. activities, (3) procedure for contacting authori-
6. Prepare a response plan and identify emer- ties, and (4) their specific responsibilities pertain-
gency contacts. ing to the defense plan.
7. Determine practical guidelines for managing
the plan, such as testing of the plan proce-
dures, and reassessment of the plan. Food Defense Resources

The food defense coordinator leads the food FDA provides multiple guidance documents and
defense team and manages the development, tools for industry in food defense planning on
implementation, and maintenance of the food their website (FDA 2016). These resources
defense plan. The food defense coordinator include:
should have knowledge of the overall operations
of the facility as well as a background and train- 1. Preventive Measures Guidance (including
ing in food defense and may be a Quality self-assessment).
Assurance/Quality Control manager or a facility 2. Vulnerability Assessment Software Tool: A
manager. Members of a food defense team may prioritization tool that can be used to assess
be from facility management, human resources, the vulnerabilities within a system or infra-
production, quality control, and security. structure in the food industry.
3. Food Defense Mitigation Strategies
Vulnerability Assessment  As individual steps Database: This database provides a range of
of a facility’s food processes are assessed for preventive measures that a firm may choose to
accessibility and vulnerability, those with the implement to better protect their facility, per-
highest overall vulnerability to intentional con- sonnel, products, and operations.
tamination should be considered “critical” pro- 4. Food Defense Plan Builder: A comprehen-
cess steps. Vulnerability assessments are similar sive tool that walks the user through all the
to conducting a hazard analysis and identifying steps of developing a food defense plan.
critical control points in food safety. According
to FDA (2016), one way to rate the risk of a pro- After completing the steps in the tool, it will
cess step is to use a scoring system, accessibility automatically generate a food defense plan. Other
and vulnerability are each assigned a score of 1 resources provided by FDA include FREE-B
(low vulnerability/accessibility) to 10 (high vul- (the Food-Related Emergency Exercise Bundle),
nerability/accessibility), and the two scores are which includes scenarios based on both inten-
summed for an overall vulnerability rating. The tional and unintentional food contamination
steps for conducting vulnerability assessment events, and Employees FIRST, an FDA initia-
includes (1) identify all food products, (2) create tive that food companies can use to train employ-
a flowchart for each food product, (3) identify the ees on food defense.
process steps of each food product, (4) evaluate USDA-FSIS also contains the following infor-
the risk of each process step, and (5) rank process mation to help companies develop, utilize, and
steps by overall vulnerabilities. update a food safety plan:
Additional Bioterrorism Information 29

1. CARVER + Shock Primer: This tool can be strategies. These experienced technicians know
used to assess the vulnerabilities within a sys- how to advise the food company on the latest
tem or infrastructure to an intentional attack. techniques for pest management and food secu-
2. Developing a Food Defense Plan for Meat rity. Normally, in-house technicians did not have
and Poultry Slaughter and Processing the access to the expertise and ongoing training
Plants: This guide provides an easy, practical, that pest management vendors possess, and they
and achievable three-step method for creating cannot store chemicals off-site. This limitation
a food defense plan. creates sanitation and bioterrorism hazards within
3. Elements of a Functional Food Defense a facility. If pest management chemicals are
Plan. stored on the premises, accidental contamination
4. Food Defense Risk Mitigation Tool. risk increases, and it is more convenient for dis-
gruntled workers or terrorists to intentionally poi-
son products and destroy a firm’s reputation.
 he Role of Pest Management
T
in Biosecurity
Additional Bioterrorism
Since pest management is an integral part of food Information
security, the training of pest management person-
nel is a viable method to improve food safety Food Detention
through monitoring the premises for indications of
bioterrorism. This is a logical approach since pest This portion of the Act authorizes Health and
management technicians have the responsibility of Human Services (HHS), through the FDA, to
investigating conditions that do not contribute to order the retention of food if an officer or quali-
wholesome foods. A link exists between pest fied employee has credible evidence or even
exclusion and food safety and security (Anon information which suggests that a foodstuff pres-
2004) since pest management technicians monitor ents a threat of serious adverse health conse-
the interior and exterior of food facilities for abnor- quences or death to humans or animals. The
mal conditions that may jeopardize food safety. HHS, through the FDA, is required to issue final
Biosecurity and pest management personnel regulations to expedite enforcement actions on
should collaborate to create a set of common perishable foods.
goals and training opportunities. The security
team can mentor pest management technicians
on what to observe when they conduct their daily  egistration of Food and Animal Feed
R
inspections, such as unusual footprints near the Facilities
perimeter or abandoned packages in the plant,
and indicate the necessary actions. Pest manage- The Bioterrorism Act requires the owner, opera-
ment personnel can teach security about monitor- tor, or agent in charge of a domestic or foreign
ing potential water contamination sites such as facility to register with FDA by December 12,
drains and sewers, identifying signs of contami- 2003. A facility is considered to be any factory,
nation of raw materials, and choosing security warehouse, or establishment, including importers
solutions that minimize pest problems, such as that manufacture, process, pack, or store food for
opting for sodium vapor lights instead of mercury human or animal consumption in the United
vapor lights, which attract pests (Anon 2004). States. Exemptions include farms, restaurants,
If a contract test management company is uti- retail food establishments, nonprofit establish-
lized, it should be a reputable firm with techni- ments that prepare or serve food, and fishing ves-
cians that are specifically trained in food pest sels not engaged in processing. Foreign facilities
management. These technicians should they are also exempt if the food from the establishment
cleared with a security background check and is designated for other processing or packaging
possess knowledge about bioterrorism prevention by another facility before it is exported to the
30 2  The Relationship of Biosecurity to Sanitation

United States or if the establishment performs a Study Questions


minimal activity such as labeling. Such a registra-
tion roster will enable the FDA to rapidly identify 1. Why is biosecurity a major concern to the
and locate affected food processors and other food industry?
establishments if deliberate or accidental contam- 2. What are the “three Ps” of protection against
ination of food occurs. bioterrorism?
3. What is the significance of the Bioterrorism Act?
4. How does biosecurity and pest management
 stablishment and Maintenance
E interface?
of Records 5. How can biosecurity and pest management
personnel complement each other?
The Secretary of Health and Human Services is 6. What has the US Department of Agriculture
required to establish requirements for the cre- done to promote food biosecurity?
ation and maintenance of records needed to 7. What has the Food and Drug Administration
determine the immediate previous sources and done to enhance food biosecurity?
the subsequent recipients of food. Such records 8. How have attacks by terrorists in the United
permit the FDA to address credible threats of States in 2001affected biosecurity among
serious adverse health consequences or death to food processors?
humans or animals. Entities that are subject to 9. What are the components of a food defense
these provisions are those that manufacture, pro- plan?
cess, pack, transport, distribute, receive, store, or 10. Which employees of a company should be
import food. Farms and restaurants are exempt involved in a food defense plan?
from these requirements. 11. What are the responsibilities of a food

defense team?
12. What is RFID?
 rior Notice of Imported Food
P 13. What is e-COA?
Shipments 14. What is agroterrorism?
15. What is traceability?
The Bioterrorism Act requires that prior notice of
imported food shipments be given to the
FDA. The notice must include a description of References
the article, manufacturer, shipper, grower (if
known), country of origin, country from which Agres T (2014). Food security. Food Qual Saf [Internet].
[cited Jul 21 2016]. Available from www.foodquality-
the article is shipped, and the anticipated port of andsafety.com/article/food-security/3/. Accessed July
entry. This regulation mandates that importers of 21, 2016.
food must give the FDA prior notice of every Angus-Lee H (2014–2015). The evolution of traceability
shipment of food before it can enter into the in the meat & poultry industry. Food Saf Mag 20(6): 42.
Anon (2004). How your pest management technician can
United States. Issued jointly with the US Bureau protect your company against bioterrorism. Food Saf
of Customs and Border Protection, the advance Mag 10(1): 36.
notification of what shipments contained in when Applebaum RS (2004). Protecting the nation’s food sup-
they will arrive at US ports of entry is designated ply from bioterrorism. Food Saf Mag 10(1): 30.
DeSorbo MA (2004). Security: The new component of
to assist these federal agencies to better target food quality. Food Qual 11(4): 24.
painting art inspections of imported foods. Fernandez A (2015). A holistic approach to traceability.
Currently, the FDA requires that companies pro- Food Qual Saf 22(3): 54.
vide prior notice and receive FDA confirmation Karas D (2014). Traceback investigations: Mapping the
maze. Food Saf Mag 20(5): 26.
no more than 5 days before anticipated arrival at O’Boyle T (2016). RFID: A taste of traceability. Food
a US port of entry and no fewer than 2 h before Qual Saf 23(3): 44.
arrival by land via road, 4 h before arrival by air Reckowsky M (2004). Preparing for bioterrorism through
or by land via rail, or 8 h before arrival by water. simulation. Food Technol 58(8): 108.
References 31

Straka C (2014). Cybersecurity in food and beverage http://www.fsis.usda.gov/wps/portal/fsis/topics/


industry. Food Qual Saf 21(5): 21. food-defense-defense-and-emergency-response/
Suslow T (2009). Produce traceability and trace-back: tools-resources-training/resources
From seed to shelf and beyond. Food Saf Mag 15(2): United States Food and Drug Administration
32. [Internet] (2016). [cited Jul 21 2016]. Available
United States Department of Agriculture [Internet] from http://www.fda.gov/Food/FoodDefense/
(2016). [cited Jul 21 2016]. Available from ToolsEducationalMaterials/ucm349888.htm

You might also like