You are on page 1of 10

J. Verbr. Lebensm.

Journal für Verbraucherschutz und Lebensmittelsicherheit


DOI 10.1007/s00003-016-1022-8 Journal of Consumer Protection and Food Safety

REVIEW ARTICLE

Food defence system in food industry: perspective


of the EU countries
Nina Puhač Bogadi1 • Mara Banović2 • Ivona Babić3

Received: 19 November 2015 / Accepted: 11 March 2016


 Bundesamt für Verbraucherschutz und Lebensmittelsicherheit (BVL) 2016

Abstract Nowadays, incidents related to intentional Keywords Food defence  Food safety 
contamination of food products are a huge problem Risk assessment  Intentional contamination 
in the whole food supply chain. Therefore, it is nec- Food industry
essary to raise awareness of food defence at every
level of the food chain, from farm to fork, from 1 Introduction
government and academic institutions to retail
chains, the media and consumers. The principles of Food defence in the European food industry is a
food defence can be implemented at every level of rather new concept in many EU countries as opposed
the food chain. Food defence contributes to the to the USA where the concept of food defence origi-
mitigation of potential risks in intentional contami- nated. It was officially defined by the Public Health
nation and food fraud, which can have a harmful Security and Bioterrorism Preparedness and
effect on humans and public health, business, econ- Response Act of 2002 (Bioterrorism Act 2002), which
omy, etc. The requirement for the implementation of was adopted after the terrorist attack on September
food defence comes from retail chains. They require 11th 2001. The primary objective of the Bioterrorism
food companies to be certified according to the act is the protection of food supply from intentional
standards of the food safety system such as those contamination. There are several definitions of food
supported by the Global Food Safety Initiative. defence. In this article, food defence is explained by
Although food defence is an inevitable step in using following definitions:
enhancing and strengthening the whole food safety
1. According to the Food and Drug Administration
system, on a global scale, an insufficient number of
(FDA), the term food defence is the effort to protect
countries have incorporated food defence principles
food from intentional acts of adulteration in cases
into their legal frameworks. The intention of this
where there is an intention to cause large-scale
review article is to increase awareness of food
public health harm and economic disruption.
defence in food industry.
Acts of intentional adulteration may take several
forms like: acts of terrorism, acts of disgruntled
employees, consumers, or competitors as well as
& Nina Puhač Bogadi economically motivated adulteration. The term
nina.puhac-bogadi@podravka.hr food defence applies to the sum of actions and
1
activities including Food defence measures taken
Podravka Inc., Food Industry, A.Starčevića 32, to protect food from intentional acts of adulter-
Koprivnica, Croatia
2
ation related to terrorism (GPO 2013).
Faculty of Food Technology and Biotechnology, 2. In the year 2014, The British Standards Institution
University of Zagreb, Pijerotijeva 6, Zagreb, Croatia
3
(BSI) published ‘‘The guide to protecting and
Ministry of Agriculture, Ulica grada Vukovara 78, defending food and drink from deliberate attack’’
Zagreb, Croatia

123
N. P. Bogadi et al.

(BSI 2014). It defines food defence as a set of Following the EU horsemeat scandal in 2013, the 5-
measures and actions regulated through proce- point Action Plan of The European Commission started
dures to ensure the security of food and drink promoting the involvement of Europol in investiga-
and their supply chains from malicious and tions (EC 2014). The cooperation between all the
ideologically motivated attack leading to con- parties involved in investigations ensuring the rapid
tamination or supply disruption. exchange of information related to fraud and food
threats (BSI 2014) are also encouraged. Food defence
Food defence concept includes activities associated
and product recall procedures are an integral part of
with the protection of the nation’s food supply from
the crisis management. When it comes to recall pro-
deliberate or intentional acts of contamination or
cedure in food defence, the ways of communicating
tampering. This term encompasses other similar
risks are different. Attention shifts from the food sys-
expressions such as bioterrorism and counter-terror-
tem to the government, primarily involving national
ism. The basic difference between food defence and
security agencies and not necessarily the food agen-
food safety is the fact that food defence deals with
cies (McEnttire and Boateng 2012).
intentional contamination of food products while
food safety deals with unintentional contamination.
The World Health Organization identified inten-
2 Main types of deliberate acts against food
tional food contamination as one of the main global
and food supply chain
public health threats of the 21st century (WHO 2007).
Food has become an instrument for terrorist acts
The British Standards Institution presented in ‘‘Guide
(WHO 2008). Threats and frauds can have a harmful
to protecting and defending food and drink from
effect on the health of consumers, society, economy,
deliberate attack’’ (BSI 2014) the main types of delib-
politics and national security. The potential threats in
erate acts against food and food supply chain. The
the food chain can include intentional contamina-
concepts are:
tion with toxic materials that cause poisoning and
death, sabotage of the supply chain that can lead to • Economically motivated adulteration (EMA) as a
food shortages, misuse of food for terrorist or crimi- subcategory of food fraud
nal purposes. When considering the concept of food fraud, it is
Trade disruption, interruption of food exports or evident that, depending on the authors, there are
tourism could cause vigorous economic conse- a number of definitions circulating. According to
quences for the majority of countries. All that can Spink and Moyer, food fraud represents inten-
lead to political destabilisation as well as social and tional activity with the purpose of gaining
public health problems, which is a reason why there economic or financial benefit as opposed to food
has to be a multidisciplinary approach to food defence whose goal is to inflict damage with evil
defence. All subjects that cooperate with food intentions. Food fraud includes the subcategory of
industry should be included, from the national to economically motivated adulteration (Spink and
the local institutions (WHO 2008). In cases of Moyer 2011; Everstine et al. 2013). However, eco-
intentional contamination such as threats or food nomically motivated adulteration can also cause
fraud, the investigation should involve different harm to consumers’ health. Unfortunately, the
institutions than those involved in unintentional scandal with melamine poisoning in China has
contamination. This implies fast action and cooper- proven this: More than 300,000 children fell ill
ation of the national and local institutions like The after consuming milk products tainted with
Ministry of Home Affairs and national security melamine. At least six children died and over
agencies as well as European and international 50,000 were hospitalized due to the adulteration
institutions like the European Commission, Europol, of infant formula and other milk products
Food and Agriculture Organization of the United (Sharma and Paradakar 2010). After the melamine
Nations (FAO), FDA, Federal Bureau of Investigation adulteration scandal, melamine has received
(FBI), etc. The coordination of the investigation much more attention from the public.
should be conducted by the security and intelli- The FDA uses the term ‘‘economically motivated
gence agencies [FBI, Department of Homeland adulteration’’ (EMA) instead of the more general
Security (DHS)], etc. In such they can take charge concept of food fraud and it defines it as ‘‘the
and the roles of people responsible for food safety fraudulent, intentional substitution or addition of
change (McEnttire and Boateng 2012). a substance in a product for the purpose of

123
Food defence system in food industry: perspective of the EU countries

increasing the apparent value of the product or consumers’ health is concerned. Malicious con-
reducing the cost of its production, i.e., for tamination may cause localized or widespread
economic gain’’. EMA includes dilution of prod- illness or death and become a tool for terrorism.
ucts with increased quantities of a substance that What is worse, food terrorism is impossible to
is already present (e.g., increasing inactive ingre- predict. Food terrorism includes threats such as
dients of a drug with a resulting reduction in malicious contamination with toxic materials
strength of the finished product, or watering juice which cause disease and even death, sabotage of
down) to the extent that such dilution poses a supply chain which leads to lack of food, abuses of
known or possible health risk to consumers. EMA food for terrorist or criminal purposes (BSI 2014;
also includes the addition or substitution of USDA 2014).
substances in order to mask dilution (FDA 2009). The World Health Organization (WHO) presents a
The EU legislation has not defined the concept of guide for member states in its edition ‘‘Terrorist
food defence yet. European Parliamentary Threat to Food: Guidance for Establishing and
Research Service has issued a briefing paper Strengthening Prevention and Response Systems’’
‘‘Fighting food fraud’’ which defines food fraud where issues related to possible threats from terror-
as ‘‘an intentional action carried out for financial ists, criminals and other anti-social groups who
gain’’. Different types of fraud include food adul- target the safety of the food supply are explained.
teration, counterfeiting, substitution and This guide defines food terrorism as ‘‘an act or threat
deliberate mislabelling of goods’’ (EPRS 2014). In of deliberate contamination of food for human
the article published by Van der Meulen (2015), consumption with chemical, biological or radionu-
there is a good overview of EU food law from the clear agents with the purpose of causing injury or
viewpoint of food fraud. It is necessary that the death to civilian population and/or disrupting social,
discussion on food defence is continued and economic or political stability’’ (WHO 2008).
expanded as the EU has no clear requirements • Espionage
for food defence while the EU legislation inter- The main motive of espionage is gaining com-
prets food fraud in different ways. Food law petitive advantage through access to intellectual
should clearly define the requirements in the property. In most cases employees (insiders) dis-
field of food defence. close information through information
While food fraud is economically motivated, food technology systems. For instance, two employees
defence is ideologically motivated by individuals of DuPont Industrial Biosciences stole the infor-
or certain organizations. The list of potential mation related to DuPont’s process for
consequences includes diseases or death, negative manufacturing titanium dioxide, used as a white-
impact on the economy and trade, negative ner in Oreo cookies and other products. The
impact on public health services and negative information was sold to a Chinese chemical
social and political implications. company (O’Halloran 2014).
Food defence is a joint concern of the food • Counterfeiting
industry and government institutions as it repre- The motivation for counterfeiting is financial
sents a threat to public health (Spink and Moyer gain. Organized crime and petty crime can cause
2011). Depending on the situation, different fac- financial loss of companies and harm their repu-
tors can increase the risk of intentional tation. For instance, ‘‘thousands of tonnes of fake
contamination and potential threats. These and sub-standard food and drink have been seized
include national, political, business, personal in 47 countries around the world as part of an
and other differences, changes in the corporate INTERPOL-Europol coordinated operation. Opera-
culture of a company, economic recession or tion Opson IV, conducted during December 2014
financial gain of a company, a mentally disor- and January 2015, resulted in the seizure of more
dered person or dissatisfied employees. than 2500 tonnes of counterfeit and illicit food,
• Malicious contamination including mozzarella, strawberries, eggs, cooking
Malicious contamination implies the realization oil and dried fruit. Involving police, customs,
of the attack with the purpose of gaining public- national food regulatory bodies and partners
ity or money as well as causing widespread harm. from the private sector, checks were carried out
Malicious contamination is more likely in retail at shops, markets, airports, seaports and indus-
chains than in food production and the conse- trial estates’’ (Europol 2015). This is an excellent
quences are more serious as far as harm to the example of good coordination between all the

123
N. P. Bogadi et al.

institutions that should be involved in food such as IFS, BRC, SQF, HACCP, GLOBALG.A.P., FSSC
defence and counterfeiting, in this case. 22000, NSF and other.
• Cybercrime The most significant food safety standards in
Modern technology provides new opportunities Europe are the British Retail Consortium (BRC) and
for malpractice. The most common reasons for the International Featured Standards (IFS). They
hacking companies are attempts to lower busi- have recognised the importance of food defence.
ness efficiency of food companies as well as data According to these standards, food defence
theft. The possible consequences are commercial requirements are mandatory and they include the
harm and an increasing threat to food safety. implementation of hazard analysis, the assessment
of related risks and the identification of critical areas
within the subject assessment (BRC 2012). In the year
2.1 Food industry
2005, the International Organisation for Standard-
ization (ISO) developed a standard for the managing
The food industry most commonly integrates a food
food safety system ISO 22000:2005. In practice, this
defence into an existing food safety system of the
standard is valid only together with the technical
company. Food defence involves documentation and
standard ISO 22002-1:2009, which specifies require-
written procedures of an already existing food safety
ments for establishing, implementing and
system. This refers to the documentation of the food
maintaining prerequisite programmes (PRP) (certi-
safety system, traceability, documentation and
fication scheme FSSC 22000). According to this
records of the management system, corrective and
standard, food defence is one of the prerequisite
preventive measures, internal audits, employee
programmes indicating that each organisation has
training, etc.
to perform the hazard analysis and to assess related
The GFSI food safety program covers most of FDA’s
risks. The hazard analysis and the risk assessment
‘‘Food Safety Modernization Act’’ (FSMA) require-
estimate potential risks depending on the type of
ments but the issue of the program’s intentional
sabotage, vandalism or terrorism. In its standard SQF
adulteration still needs to be addressed. The concepts
Code, The Safe Quality Food Institute (SQFI) also
are very similar whereby the threat and vulnerability
indicates the need to define the methods, responsi-
of the systems and facilities must be evaluated using
bilities and criteria for the prevention of intentional
the HACCP concepts in order to guard against
contamination caused by sabotage or a terrorist act
intentional adulteration. The GFSI has defined the
(SQF 2014).
following two concepts: VACCP (vulnerability/food
Regardless of the food safety standards, they all
fraud) and TACCP (threat/food defence) (GFSI FORUM
imply that it is necessary to implement corrective
2014). The GFSI has defined the Food Safety Man-
measures in accordance with the assessments of
agement as an ‘‘umbrella’’ that includes HACCP
related risks. If a food company has partnership
(hazard/Food Safety), TACCP (threat/Food Defence)
agreements or exports products to certain countries,
and VACCP (vulnerability/Food Fraud).1 These three
it is obliged to apply the requirements for food
separate scopes should be addressed individually
defence defined by the food safety standards and the
(Fig. 1).
legislation of certain countries. Food defence is a
From the perspective of food companies, the main
concern in almost all business areas in the food
initiators of the food defence implementation are the
industry, where intentional contamination and food
retail chains, who condition the producer’s certifi-
fraud can pose a serious threat to the consumers’ and
cations in accordance with one of the system
public health as well as damage company business
standards in food safety. The same conditions also
(BSI 2014).
apply in case of a cooperation between various
The food industry implements food defence
business partners who participate in the food supply
mainly in agricultural production, processing, stor-
chain, such as retail chains, outsourcing or logistics
age and transport, wholesale and retail distribution
services. Standards supported by the GFSI Initiative
and tracing systems and recalls (traceability being
are the prerequisite for business cooperation. These
one of the obligatory requirements).
include globally recognised certification schemes
Depending on the size of a food company, food
defence can be implemented on the level of its
management, human resources, purchasing depart-
1
http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food- ment, receipt and storage of raw materials,
fraud-and-vulnerability-assessment-vaccp/. production, quality control, packaging and labelling,

123
Food defence system in food industry: perspective of the EU countries

Fig. 1 Umbrella of the GFSI


food safety management
Food Safety Management system by GFSI

Food Safety Food Defence Food Fraud

HACCP TA C C P VA C C P
Hazards Threats Vulnerabilities

Prevention of unintentional Prevention of Prevention of


accidental adulteration intentional adulteration intentional adulteration
- Science based - Behaviourally or - Economically motivated
- Food borne illness ideologically motivated

storage of finished products, transport and distribu- the production process. In production, the HACCP
tion (BSI 2014; USDA 2014). team often carries out the activities related to food
defence. In addition, the HACCP team should com-
plement with experts from other areas such as the
3 Materials and methods corporate security of the company.
The team members are chosen based on their
3.1 Risk assessment—threat assessment knowledge and professional skills in the following areas:
of critical areas in the food supply chain security, human resources, food technology, production
and operations, purchasing department and supply,
When assessing critical areas in the food supply distribution, communications and marketing. Along
chain, it is required to define the criteria for risk with indisputable knowledge and professionalism, the
analysis. Mostly, the criteria are based on the impact team members need to be reliable, discrete and aware of
of the threat on the consumers’ health as well as on the implications of the process (BSI 2014).
potential social, economic and political conse- At present, several food defence approaches can be
quences. Therefore, food manufacturers, suppliers applied in practice. One of them is provided by the British
and retail chains should reinforce safety measures Standards Institution in PAS 96:2014. This standard
during the production process and assess the weak- allows organizations to avoid and mitigate food threats
nesses in their scope of work and responsibility. in the entire food supply chain. Its refers to a TACCP
The first step in the implementation of food defence approach. The term Threat Assessment Critical Control
systems in the food industry is determining the scope. Point (TACCP) includes ‘‘systematic management of risk
So far, existing literature is based on production facil- through the evaluation of threats, identification of vul-
ities because risk assessment has shown that the level nerabilities, and implementation of controls to materials
of risk has been at its highest there. However, larger and products, purchasing, processes, premises, distri-
food companies with more production facilities and bution networks and business systems’’. In the context of
management functions should extend the scope to the food defence, threat is something that can cause loss or
entire company (management board, human resour- harm which arises from the ill-intentioned people (BSI
ces, purchasing department, etc.). 2014). Threat is based on the motivation, method, and
The team for the implementation of the food capability of an attack.
defence system should be multidisciplinary and The Food Defence Plan is the main document of
consist of technical staff who specialized in a relevant the food defence system in food industry (FDA 2014;
field of activity. People that are responsible for food USDA 2014; GPO 2013). It defines the principles and
defence implementation should be appointed in all the implementation of food defence. It includes
facilities because food defence does not refer only to activities that can change depending on country,

123
N. P. Bogadi et al.

organisation, regulatory requirements, responsibility, plan that addresses vulnerabilities associated with
management commitment and awareness of the food defence and food fraud, the same as HACCP
employees. Planning food defence activities in the plan addresses the hazards associated with uninten-
production process has to according to the existing tional contamination.
food safety system. This implies the integration of the The FDA proposes a group of activities to be
food defence system with food safety with the food included in the food defence plan. First is the Iden-
safety prerequisite programmes, written procedures tification of actionable process steps and the
for traceability in the food supply chain and proce- implementation of Focused mitigation strategies, i.e.
dures for recall/withdrawal of products from measures that are necessary to reduce the likelihood
markets. However, it should be emphasized that the of intentional contamination caused by an act of
food defence strategies intend to address threats and terrorism. This measure is based on the risk-assess-
not to be used in an existing food safety plan. ment tool CARVER ? Shock. A further variable to
Food companies need to decide on the risk man- measure is Monitoring. Next, there are Corrective
agement methodology used in conducting risk actions of the food safety system that ensure the
assessment. Several efficient methods are published performance of the entire system. The same princi-
and every organisation needs to decide which ples apply to food defence. Verification activities for
methodology meets their requirements most. The food safety can also be used for food defence. The
methods should be user-friendly so it is necessary to final step is Training which requires the employees
upgrade them constantly. Risk assessment is con- and supervisors working in the field of food defence
ducted with the purpose of defining control and to become aware of food defence and their respon-
preventive measures. The Food Defence Plan obliges sibilities. The last mentioned measure refers to
food companies to implement internal audits and the keeping records about food protection confidential
analysis of the food defence system, which enables and safe from intentional adulteration caused by acts
continuous improvements of the system. This defined of terrorism (GPO 2013).
plan should undergo a testing at least once a year. As mentioned above, the FDA and USDA adapted a
The test examines the effectiveness of the defined tool called CARVER, originally used for military pur-
control and preventive measures and, if necessary, poses, for vulnerability assessment in the food sector.
regulates new preventive measures (FDA 2014; USDA CARVER is an acronym for the following six attri-
2014; Spink and Moyer 2011). butes used to evaluate the attractiveness of a target
for an attack:
3.2 Food defence process as defined by PAS
• Criticality—refers to the impact of an attack on
96:2014 of The British Standards Institution
public health and the economy.
• Accessibility—refers to the ability to physically
In order to apply and manage all prescribed activities
access and egress from the target.
in the area of food defence, it is necessary to define
• Recuperability—refers to the ability of a system to
the TACCP team. The TACCP teams implement all
recover from an attack.
activities prescribed when conducting food defence
• Vulnerability—refers to the ease of accomplishing
(Fig. 2).
an attack.
Figure 2 specifies the most important steps of the
• Effect—refers to the amount of direct loss from an
TACCP food defence process which are: assessment,
attack as measured by loss in production.
identification, implementation, revision and moni-
• Recognizability—refers to the ease of identifying a
toring. Food defence assessment is based on 3 basic
target.
types (BSI 2014):
The 7th attribute is shock. It assesses health, eco-
• threat assessment,
nomic, and psychological impacts of an attack on the
• vulnerability assessment and
food industry. These adapted methodologies
• likelihood of the threat assessment and its impact.
improved vulnerability assessment and allowed for
the identification and estimation of economic and
3.3 Food defence assessment defined by the FDA psychological impacts throughout the food system
(GPO 2013).
The FDA proposed food defence measures in the Risk management according to ISO 31000 was
Federal Register/Vol. 78, No. 24721 CFR Parts 16 and applied in safety risk assessments ahead of food
121 (Fig. 3). These measures require a food defence defence assessment. It has been recognized that,

123
Food defence system in food industry: perspective of the EU countries

Fig. 2 Flowchart of the food


defence process (BSI 2014) TACCP team

1. 15. 14. 13.


Assess Monitor horizon scans Review and revise Decide and implement
new information and emerging risks necessary controls

2. 11. 12.
Identify and assess Likelihood v Impact → Identify who could
threats to organization Priority carry it out?

3. 10. 9.
Identify and assess Determine if control Identify which supply
threats to operation procedures will detect points are most critical
the threat

4. 8.
Select product Concider impact of
threats identified

5. 6. 7.
Identify and assess Devise flow chart of Identify key staff and
threats to product product supply chain vulnerable points

compared to risk, vulnerability is more a state of emphasis on food defence. The education pro-
being that could lead to an incident (Spink 2014). gramme should consist of acquiring the basic level of
While conducting threat analysis and assessing awareness on t food defence, the implementation of
vulnerability with the purpose of the implementation, prescribed procedures and assessment methods for
maintenance and improvement of food defence, one the identification and mitigation of potential risks
can use risk assessment methods based on the ISO (ICH Q9 2005).
standards Risk Management ISO 31000:2009 and ICH
Q9 Quality Risk Management. The majority of food
4 Results and discussion
companies are familiar with these methods because
they are used for conducting risk assessment in food
In many countries and food companies, the security
safety management systems. These are methods such
of the food supply chain has taken on a significant
as Risk matrix, Checklists, Failure Mode and Effect
importance due to terrorist attacks and cases of food
Analysis—FMEA, etc. Risk assessment techniques are
fraud. These incidents have contributed to the
described in the supporting standard ISO 31010:2009
development and implementation of the food
Risk Management—Risk assessment techniques. It pro-
defence system. To avoid serious consequences, it is
vides the guidelines for the selection and application
essential to recognise the hazards early before they
of systematic techniques in risk assessment.
become real risks. In order to survive on the market,
food companies have to follow market demands and,
3.4 Education and raising employee awareness in accordance with them, constantly introduce dif-
ferent food safety and quality systems.
The company’s efficiency is in the implementation of
new methods, tools and systems depends on the level 4.1 Global overview
of education of its employees. A new implementation
of a food defence system in a country requires not Food defence is relatively new in both the EU and
only raising the employees’ awareness on a company non-EU countries. Therefore, it is necessary to work
level, but also on the level of government institutions. on raising awareness on food defence and to apply
Education programmes should focus on the connec- risk management methods. The integration of food
tion of the public and private food sector with an defence into legislation is required. Therefore, the

123
N. P. Bogadi et al.

Food Defense Measures (by FR-2013-12-24 Federal Register-Vol.78, No. 247)

Food Defense Plan


1. Identification Actionable Process Steps
A. Written Food Defense Plan includes:
option 1 option 2
1. Actionable Process Steps
2. Focused Mitigation Strategies
Assess whether your facility has one or more of Perform a vulnerability assessment using
3. Monitoring
these FDA identified key activity types*: appropriate methods and qualified individual(s)
4. Corrective Actions
1. Bulk liquid receiving and loading
5. Verification
2. Liquid storage and handling
Perform a vulnerability assessment using
3. Secondary ingredient handling
B. Training of supervisors and personnel appropriate methods and qualified individual(s)
4. Mixing and similar activities
working at actionable process steps

Identify actionable process steps for significant


Identify actionable process steps for each
C. Records to be prepared and kept
vulnerabilities
applicable key activity type

5. Verification
* FDA identified
2. Focused Mitigation Strategies these key activity
Verify that monitoring is conducted types using findings
Identify and implement focused mitigation strategies at actionable of vulnerability
assessments of over
process steps 50 food products
Verify that appropriate decisions about and process. These
activity types
corrective actions are made 3. Monitoring commonly rand high
in vulnerability
Establish and implement procedures for monitoring focused based on various
Verify that focused mitigation strategies are factors, including
mitigation strategies the ability to
consistently implemented and are effective physically access
the food or process
4. Corrective Actions and the potential to
adulterate a
Conduct reanalysis of the food defense plan, as sufficient quantity of
Establish and implement procedures for corrective actions if
appropriate product in order to
focused mitigation strategies are not properly implemented cause massive
public health harm.

Fig. 3 Food defence measures (GPO 2013)

European Commission carries out risk assessment intentional contamination prescribed in their legis-
through the European Food Safety Authority (EFSA) lation have to develop their national strategies for
and ensures that any actions taken in the event of a the whole food supply chain, agriculture and food
crisis are scientifically proven as well as politically defence. On the national level, it is required to define
responsible and legitimate (Bénoliel 2007). Food a food defence programme determining preventive
fraud and food threat should be taken very seriously. measures for potential threats and food sabotage.
General requirements of the EU law primarily focus These programmes should be joint initiations. Toge-
on food safety. Nowadays, food fraud is on the rise ther with the food industry, the governments of
and, as a result, The European Commission put for- different countries need to work on strengthening
ward measures to strengthen the global food chain, the national security of food and, therefore, on food
specifically to identify fraudulent activity (EPRS 2014). defence during production, processing and distribu-
The GFSI Board decided to issue a position paper tion (WHO 2008).
expressing their belief that the mitigation of food
fraud is an integral part of a company’s management
system for food safety. Therefore, they will include 4.2 Food defence—subject integrating a wider
new requirements specific to food fraud mitigation community
in the next full revision of the GFSI Guidance Docu-
ment 7th Edition, which is due to be published early In order to obtain a comprehensive function of food
in 2016 (GFSI 2014). Countries not having food defence, it is essential to raise the awareness in the
defence requirements and measures against whole food supply chain, from farm to fork, from

123
Food defence system in food industry: perspective of the EU countries

government, state and academic institutions to retail org/index.php/41-european-affairs/summer-2007/97-eu-


chains, media and consumers. To incorporate food defending-food-chain-against-bio-attack. Accessed 1st
Mar 2016
defence into all stages of the food supply chain BRC Global Standard (2012) BRC global standard for food safety.
requires a lot of work (Applebaum 2014). Raising the http://www.brcglobalstandards.com/Knowledgecentre/Food
awareness and purpose of food defence can help to Safety-AGlobalView.aspx#.VtWwZ0ZCfPE. Accessed 1st Mar
establish effective measures. This will instigate joint 2016
British Standards Institution (2014) PAS 96:2014 Guide to
activities in all areas necessary to improve food safety protecting and defending food and drink deliberate
on a global level. attack. http://www.food.gov.uk/sites/default/files/pas96-
2014-food-drink-protection-guide.pdf. Accessed 2nd Mar
2016
5 Conclusion European Commission (2014) MEMO/14/113 Horsemeat: one
year after - [ actions announced and delivered! http://ec.
europa.eu/food/safety/docs/official-controls_food-fraud_
On one hand, the awareness of the food defence is five-point-action-plan_en.pdf. Accessed 1st Mar 2016
not the same in all parts of the world. On the other European Parliament Research Service (EPRS) Briefing (2014)
hand, the world is a global village with food on its Fighting food fraud. http://www.europarl.europa.eu/
global market. This increases the risk of spreading RegData/bibliotheque/briefing/2014/130679/LDM_BRI%
282014%29130679_REV1_EN.pdf. Accessed 1st Mar 2016
contaminated and adulterated food. Other potential Europol (2015) Record seizures of fake food and drink in
factors of risk are national, political, economic, INTERPOL-Europol operation 16. https://www.europol.
business and personal differences. Food industry has europa.eu/content/record-seizures-fake-food-and-drink-inter
been facing many risks. They can have negative pol-europol-operation. Accessed 1st Mar 2016
Everstine K, Spink J, Kennedy S (2013) Economically motivated
influence on product safety and, eventually, on the adulteration (EMA) of food: common characteristics of
business activities of a company. Intentional con- EMA incidents. J Food Prot 76(4):723–735
tamination of food products and food fraud are some Global Food Safety Initiative (2014) GFSI position paper on
of the possible risks. Implications are not limited only mitigating the public health risk of food fraud. http://
www.mygfsi.com/news-resources/news/295-gfsi-position-
to food producers but also more widely. Therefore, paper-on-mitigating-the-public-health-risk-of-food-fraud.
one of the basic steps is to raise awareness of food html. Accessed 2nd Mar 2016
defence through the whole food chain, from the food Global Food Safety Initiative FORUM (2014) SGS—food safety
sector to government institutions. Educational insti- modernization act (FSMA) updates and how Global Food
Safety Initiative (GFSI) audits can help with compliance.
tutions should incorporate food defence in their http://www.mygfsi.com/news-resources/news/275-sgs-food-
curricula. There are critical factors at all levels of the safety-modernization-act-fsma-updates-and-how-global-
food chain so one cannot prevent intentional con- food-safety-initiative-gfsi-audits-can-help-with-compliance.
tamination and food fraud without regulated legal html. Accessed 2nd Mar 2016
GPO (2013) Proposed rules, part III, Food and drug administra-
provisions and effectively written procedures. tion, focused mitigation strategies to protect food against
Food companies and other stakeholders who have intentional adulteration. Fed Regist 78(247):78013–78061
not incorporated food defence principles in their (FR Doc No: 2013-30373). http://www.gpo.gov/. Accessed 24
regulations can find help in prepared materials and Dec 2013
International Conference on Harmonisation of Technical
tools such as CARVER ? Shock Vulnerability Assess- Requirements For Registration of Pharmaceuticals For
ment Software (FDA) or from the PAS 96:2014 Guide Human Use (2005) Q9 Quality risk management version 4.
to protect and defend food and drink from deliberate http://www.ich.org/fileadmin/Public_Web_Site/ICH_Products/
attack by BSI. Guidelines/Quality/Q9/Step4/Q9_Guideline.pdf. Accessed 2nd
Mar 2016
Compliance with ethical standards International Organization for Standardization (2005) Food
safety management systems—requirements for any orga-
Conflict of interest The authors declare that they have no nization in the food chain. ISO 22000:2005. http://www.
conflict of interest. iso.org/iso/catalogue_detail?csnumber=35466 Accessed
2nd Mar 2016
International Organization for Standardization (2009) Prereq-
uisite programmes on food safety—part 1: food
References manufacturing. ISO 22002-1:2009. http://www.iso.org/iso/
iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber
Applebaum RS (2014) Terrorism and the nation’s food supply =44001. Accessed 2nd Mar 2016
perspectives of the food industry: where we are, what we International Organization for Standardization (2009) Risk
have, and what we need. J Food Sci. doi:10.1111/j.1365-2621. management—risk assessment techniques. ISO/IEC
2004.tb15493.x 31010:2009. http://www.iso.org/iso/home/store/catalogue_
Bénoliel I (2007) EU defending food chain against bio-attack. tc/catalogue_detail.htm?csnumber=51073. Accessed 2nd
Eur Aff 8(1):70–74. http://www.europeaninstitute. Mar 2016

123
N. P. Bogadi et al.

McEnttire J, Boateng A (2012) Industry challenge to best US Food and Drug Administration (2009) Economically moti-
practice risk communication. J Food Sci. doi:10.1111/j.1750- vated adulteration. 74 Fed Regist 64:15497–15499. http://
3841.2012.02630.x www.federalregister.com/Browse/Document/usa/na/fr/2009/
O’Halloran S (2014) DuPont industrial espionage case ends with 4/6/e9-7843. Accessed 1st Mar 2016
convictions. Food Eng. http://www.foodengineeringmag. US Food and Drug Administration (2014) Food defence. http://
com/articles/92018-dupont-industrial-espionage-case-ends- www.fda.gov/food/fooddefense/. Accessed 1st Mar 2016
with-convictions. Accessed 6 Mar 2014 Van der Meulen B (2015) Is current EU food safety law geared
Safe Quality Food Institute (2014) SQF code a HACCP-based up for fighting food fraud? J Verbr Lebensm 10(S1):S19–S23
supplier assurance code for the food industry, edition 7.2. World Health Organization (2007) The world health report—a
https://www.sqfi.com/wp-content/uploads/SQF-Code_Ed-7. safer future: global public health security in the 21st
2-July.pdf. Accessed 2nd Mar 2016 century. http://www.who.int/whr/2007/whr07_en.pdf?ua=
Sharma K, Paradakar M (2010) The melamine adulteration 1. Accessed 2nd Mar 2016
scandal. Food Sec 2(1):97–107. doi:10.1007/s12571-010-0057-4 World Health Organization (2008) Terrorist threats to food
Spink J (2014) GFSI direction on food fraud and vulnerability guidance for establishing and strengthening prevention
assessment (VACCP). http://foodfraud.msu.edu/2014/05/08/ and response systems, revision. http://seafood.oregonstate.
gfsi-direction-on-food-fraud-and-vulnerability-assessment- edu/.pdf%20Links/WHO%20Food%20Safety%20Issues%20-%
vaccp. Accessed 8 May 2014 20Terrorist%20Threats%20to%20Food.pdf. Accessed 2nd
Spink J, Moyer DC (2011) Defining the public health threat of Mar 2016
food fraud. J Food Sci. doi:10.1111/j.1750-3841.2011.02417.x
US Food and Drug Administration (2002) Bioterrorism act.
http://www.fda.gov/RegulatoryInformation/Legislation/
ucm148797.htm. Accessed 1st Mar 2016

123

You might also like