20) Biosecurity, Food Adulteration and Food Supply Protection Flashcards
define food adulteration
food pdt failing to meet legal standards
what are examples of food adulteration?
- adding an ingredient of lesser value
- adding color/flavour to mask a defect
- using a species of lesser value (eg. horse meat)
- using an ingredient from an off-label location
define food security
access to sufficient calories on a daily basis
why is food safety a food security issue?
contaminated food can’t be eaten and may threaten the food supply
define food bioterrorism
intentional contamination of food for economic gains or to cause harm
what is the cause of foodborne illness?
system failure that enables the introduction, growth and survival of the contaminant to reach levels high enough to cause harm
what are steps to evaluate the effectiveness of an intervention of reducing risk of intentional contamination
- analyze vulnerability of a particular section/operation within the food system
- deploy an intervention
- analyze the vulnerability again
what are 2 sets of risk management tools that can be used in intentional food contmaination risk management?
- ORM: operational risk management
2. CARVER: criticality, accessibility, recuperability, vulnerability, effect, recognizability
define ORM
operational risk management: function of the severity and probability of the failure
what are the 5 steps in ORM?
- identify the hazard
- assess potential consequence of the hazards
- determine which risks to manage with which interventions
- implement the interventions
- assess the success of the interventions
in ORM, what is the scale/levels of:
a) severity
b) probability
(they have diff scales)
severity:
- very high: high morbidity and mortality
- high: primarily morbidity and some mortality
- medium: some morbidity and no mortality
- low: no real impact
probability:
- very high: system continuously vulnerable
- high: system regularly vulnerable
- medium: system sporadically vulnerable
- low: system seldom vulnerable
- very low: system rarely vulnerable
what is the general approach of ORM?
- select food system(s) of concern
- identify points of vulnerability
- conduct a severity vs probability assessment for the vulnerability
- vulnerabilities are ranked
- intervention efforts take place to migitate risks
- evaluate success of intervention
describe CARVER + Shock
a process used to evaluate the vulnerability of a food operation system by evaluating each node within the system
what are the 7 elements of CARVER+shock
- criticality: degree that public health or economic consequences are nationally significant
- accessibility: physical access to target
- recuperability: overall system resiliency measured by time needed to bring system into operation
- vulnerability: attack feasibility viewed by potential for a successful attack
- effect: defined by fraction of the food system impacted by attack
- recognizably: ease of target identification
- shock: combined health, economic and psychological impacts of a successful attack
what are the 1st and 2nd steps of CARVER+shock?
- define a scale (have points for high and low risk nodes)
2. evaluate food facility and identify unique nodes. Each node should represent entire production system