18 - Food Adulteration, Biosecurity, and Food Supply Protection Flashcards

1
Q

when a food product fails to meet legal standards, this is called:

A

food adulteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in what forms can food adulterations come?

A
  • adding an ingredient of lesser value (melamine in milk)
  • adding color/flavor to mask a defect
  • using a species of lesser value
  • using an ingredient from an “off-label” geographic location (selling asian oysters marketed as canadian oysters)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

food adulteration is (simple/hard) to detect

A

hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is food security?

A

access to sufficient calories in a on a daily basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

true or false: food’s abundance is more of an issue than food’s adverse effects

A

false - becoming ill from food is a more significant concern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

true or false: food safety is part of food security

why?

A

true - contaminated food can’t be eaten and may threaten food supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define food bioterrorism

A

intentional contamination of food for economic gains or to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

name some examples of bioterrorism

A
  • Athenians contaminated drinking water in the city of Kirrha
  • plague-infested human bodies were dumped into water supplies during roman times
  • in WWII, Japan used Bacillus anthracis, Shigella spp, vibrio cholerae, and Salmonella as biological weapons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

foodborne illness is usually called by

A

system failure :(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

bioterrorism is usually caused by

A

attacks on a system that defeat the controls in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

true or false: there’s stringent measures to stop intentional tampering

A

false

there’s actually few controls. yikes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what was the largest bioterror attack ever executed in the US?

A
the Rajneeshee bioterror attack in 1984 where cult member spread Salmonella over buffet-style restaurant food to sway an election
ill: 751
hospitalized: 45
deaths: 0
economic losses: total
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why are stakeholders reluctant to invest in resources to protect against intentional food contamination?

A

chances of an attack are really low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what approach is used to address intentional food contamination?

A

evaluate the degree to which the intervention reduces the vulnerability of each system within the overall foods supply infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the steps for intentional food contamination risk management?

A

1) analyze the vulnerability of an operation within the food system
2) deploy an intervention
3) analyze the vulnerability again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the approached used for this risk management (does/does not) address if the intervention is economically justified

A

does not

17
Q

what are the two risk management tools used to help with intentional food contamination?

A
  • operation risk management (ORM)

- critically, accessibility, recuperability, vulnerability, effect, recognizability (CARVER)

18
Q

what’s ORM?

A

function of the SEVERITY of the failure and the PROBABILITY of the failure

19
Q

how many steps to ORM? what are they

A

there’s five steps:

1) identify the hazards
2) assess the potential consequences of the hazards
3) determine which risks to manage with which interventions
4) implement the interventions
5) assess the success of the interventions

20
Q

probability and severity are evaluated on separate scales. depict each part of the scales.

A

severity: very high, high, medium, and low
probability: very high, high, medium, low, very low

21
Q

successful ORM (does/does not) require that sensitive details on potential agents be discussed

A

does not

22
Q

true or false: only general characteristics need to be known in ORM

A

true

23
Q

what’s CARVER+Shock?

A

process used to evaluate the vulnerability of a food operation system by evaluating each node within the system

24
Q

how many elements are there to CARVER+Shock? what are they?

A

there’s 7:

1) criticality
2) Acessibility
3) Recuperability
4) vulnerability
5) Effect
6) Recognizability
7) shock

25
Q

describe the first step of CARVER+Shock

A

define a scale so points can be assigned to high-risk nodes and low-risk nodes

26
Q

describe the second step of CARVER+Shock

A

evaluate the food facility, identify unique nodes

27
Q

nodes in total should represent the

A

entire production system

28
Q

how many nodes the production process for ice cream contain?

A

32

29
Q

what are some of the detection and diagnostic systems?

A
  • detect to prevent
  • detect to protect
  • detect to recover
30
Q

describe detect to prevent

A

enables positive confirmation of contamination BEFORE a finished food item leaves the facility to eliminate any chance of public health concerns

31
Q

describe detect to protect

A

takes place AFTER the food has left the factory. prevents sale of contaminated food

32
Q

describe detect to recover

A

takes place once food has already been purchased. goal is to minimize impact.

33
Q

read slide 15 because i don’t know how to ask questions for it

A

you got it boss