18 - food adulteration, biosecurity and food supply protection Flashcards
what are the several form of food adulteration?
Adding an ingredient of lesser value (melamine in milk)
Adding colour or flavor to mask a defect
Using a species of lesser value (cow milk used to dilute goat milk, horse meat instead of cow meat)
Using an ingredient from an “off-label” geographic location
What is food security ?
the access to sufficient calories on a daily basis
Why is food safety an issue of food security
because contaminated food can’t be eaten and the more there is contaminated food and the more it stresses the food supply chain
T or F : the possibility of becoming ill from food is increased in the developed countries
true
What is food bioterrorism?
intentional contamination of food for economic gains or to cause harm
what are the steps taken in order to reduce the vulnrability of each system within the food supply infrastructure?
1- analyse the vulnerability of an operation within the food system
- deploy an intervention
- analyse the vulnerability again
What are the two sets of risk management to help with accessing the risk?
1- operational risk management (ORM)
2- criticality, accessibility, recuperability, vulnerability, effect, recognixability (CARVER)
What is the ORM ?
a five step process in which you identify and manage risks and for each vulnaribility you conduct a severity vs probability
T or F : probability and severity are synonyms
false
** T or F : in the case of the ORM you need to discuss specific strains that could cause harm
false, you don’t need to discuss about sensitvie detaisl on potential agents
What are the 5 steps of the ORM ?
- Identify the hazards
- Assess the potential consequences of the hazards
- Determine which risks to manage with which interventions
- Implement the interventions
Assess the success of the - interventions
What is the difference between the carver+ shock and the ORM
in the case of the ORM you loosely define the probability and severity of an identified vulnerability while in the carver shock you evaluate the vulnerability by evaluating each node of a system
What does carver stands for
- criticality
- accessibility
- recuperability
- vulnerability
- effect
- recognizably
What is criticality ?
The degree to which public health or economic consequences are nationally significant
What is the accessibility?
Physical access to the target
What is the recuperability ?
The overall system resiliency as measured in the time required to bring the system back into operation
What is the Vulnerability
Attack feasibility as viewed by the potential for a successful attack
what is the effect ?
Direct losses from a food attack as defined by the fraction of the food system that has been impacted by the attack
What is the recognizably?
The ease of target identification, or the amount of specialized knowledge needed to identify the point for intentional contamination (example easy for buffet and not easy in processing plants)
What is the shock?
The combined health, economic, and psychological impacts of a successful attack
What is the detect to prevent ?
a strategy taken in the processing plant to detect and eliminate the chance of public health concenrs
What is the detect to protect ?
prevent health conseuences after the product as left the facility to prevent the sale of contaminated foods
What is the detect to recover step?
rapid identification of intentional contamination in order to quickly contain the event to minimize the impacts
What is the detect to prevent, to protect and to recover system ?
is an approach for evaluating detection and diagnostic system intervention options