{"id":2228,"date":"2017-08-02T09:13:52","date_gmt":"2017-08-02T13:13:52","guid":{"rendered":"https:\/\/blog.foodfraudpreventionthinktank.com\/?p=2228"},"modified":"2024-03-14T14:46:33","modified_gmt":"2024-03-14T18:46:33","slug":"food-fraud-prevention-compliance-what-is-really-required","status":"publish","type":"post","link":"https:\/\/blog.foodfraudpreventionthinktank.com\/food-fraud-prevention-compliance-what-is-really-required\/","title":{"rendered":"Food Fraud Prevention Compliance \u2013 What is Really Required? (Announcement of the New Food Fraud Audit Guide MOOC)"},"content":{"rendered":"
This blog post was created after several separate conversations with several senior industry leaders who are in charge of Food Fraud prevention for their Fortune 1000 Corporations. \u201cWait, what? What is required for GFSI compliance?\u201d The answer was simple but a bit of a revelation. Also, by focusing on the specific requirements \u2013 and resources available \u2013 it is a bit more of a re-formatting rather than a big undertaking.<\/p>\n
This is also an announcement of our new Food Fraud Audit Guide MOOC (see www.FoodFraudMOOC.com).<\/p>\n
FSMA\/ FDA Food Fraud Compliance Requirements<\/strong><\/p>\n For Food Fraud prevention, FSMA refers to \u201ceconomically motivated adulteration\u201d with a broad focus covering all hazards that are \u201ceconomically motivated.\u201d FSMA does not require that companies do anything to pass an audit \u2014 but it does hold companies accountable for any and all hazards.\u00a0 We emphasize that after a Food Fraud incident, illness, or death, it would be logical for a government investigator to ask, \u201cHow did you determine this was NOT a \u2018hazard that requires a preventive control?\u2019\u201d<\/p>\n GFSI Food Fraud Prevention Compliance Requirements<\/strong><\/p>\n GFSI clearly defines the scope of Food Fraud to include all types of fraud (e.g., not just adulterant-substances but also to include theft, tampering, counterfeiting, etc.) and all products (e.g., incoming goods such as raw materials\u00a0and<\/em>\u00a0<\/strong>outgoing goods including finished products destined for retail shelves.) GSFI only requires that a\u00a0Food Fraud Vulnerability Assessment<\/em><\/strong>\u00a0be completed and documented\u00a0and<\/em>\u00a0then that a\u00a0Food Fraud Prevention Strategy<\/em><\/strong>\u00a0be completed and documented. There are no further published requirements or guidance on the method, process, details, length, depth, etc.<\/p>\n GFSI Food Fraud Prevention Compliance Requirements<\/strong><\/p>\n For yourself or your suppliers, review the basic Food Fraud Prevention Audit Questions:<\/p>\n GFSI Food Fraud Prevention Audit Requirements [1]:<\/u><\/strong><\/p>\n If you answer \u201cyes\u201d to all ten questions \u2013 for both you and for your suppliers \u2013 then congratulations. You appear to be fully GSFI Compliant regarding Food Fraud. If not, then the first step is to review the requirements and begin a process that will achieve at least the minimum GFSI compliance requirements.<\/p>\n GFSI pre-filter\/ initial screening Food Fraud Vulnerability Assessment<\/strong><\/p>\n A method to begin assessing Food Fraud vulnerabilities is to start from the top-down (\u201cmacro level\u201d) and conduct a \u201cpre-filter\u201d or initial screening. It is understandable if the first assessment has a low degree of certainty and robustness. This initial screening is based on COSO managerial accounting principles in Enterprise Risk Management (ERM). The pre-filter enables you to identify where a more detailed vulnerability assessment is needed \u2014 or not. The first assessment is often one matrix for all incoming goods and one matrix for all outgoing goods \u2014 each having no more than five types of market segments and five groups of products.<\/p>\n An initial screening is directional and leads to subsequent vulnerability assessments having high degrees of confidence and robustness. Without an initial screening, the other extreme would be conducting a full Food Fraud Vulnerability Assessment on every supplier-product combination (potentially at the ingredient level). For even a medium size company, they could have 1000 suppliers and each supplier providing an average of 10 product variations which would require 10,000 separate assessments. It was estimated the fully detailed vulnerabilities assessments could take years to complete.<\/p>\n One support resource is the Food Fraud Prevention Academy\u2019s free, open, online educational opportunities. There are also in-person Executive Education courses available. These include the development of an effective and efficient Food Fraud Prevention Strategy and another on conducting Food Fraud Vulnerability Assessments. (An actual Food Fraud Initial Screening is completed in the latter course). It is most efficient to establish the parameters of your project\u00a0before<\/em>\u00a0making decisions to move forward.<\/p>\n References<\/p>\n [1] Food Fraud Prevention Academy, Food Fraud Audit Guide MOOC (Massive Open Online Course), (see www.FoodFraudMOOC.com)<\/p>\n","protected":false},"excerpt":{"rendered":" This blog post was created after several separate conversations with several senior industry leaders who are in charge of Food Fraud prevention for their Fortune 1000 Corporations. \u201cWait, what? What is required for GFSI compliance?\u201d The answer was simple but a bit of a revelation. Also, by focusing […]<\/p>\n","protected":false},"author":16,"featured_media":5474,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[],"uagb_featured_image_src":{"full":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a.jpg",1120,630,false],"thumbnail":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a-150x150.jpg",150,150,true],"medium":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a-300x169.jpg",300,169,true],"medium_large":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a-768x432.jpg",768,432,true],"large":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a.jpg",1120,630,false],"2048x2048":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2017\/08\/food-fraud-prevention-think-tank-image-10149a.jpg",1120,630,false]},"uagb_author_info":{"display_name":"John W. Spink, PhD","author_link":"https:\/\/blog.foodfraudpreventionthinktank.com\/author\/john-w-spink-phd\/"},"uagb_comment_info":0,"uagb_excerpt":"This blog post was created after several separate conversations with several senior industry leaders who are in charge of Food Fraud prevention for their Fortune 1000 Corporations. \u201cWait, what? What is required for GFSI compliance?\u201d The answer was simple but a bit of a revelation. Also, by focusing […]","_links":{"self":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/2228"}],"collection":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/comments?post=2228"}],"version-history":[{"count":5,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/2228\/revisions"}],"predecessor-version":[{"id":5478,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/2228\/revisions\/5478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/media\/5474"}],"wp:attachment":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/media?parent=2228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/categories?post=2228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/tags?post=2228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n
\n