Biosecurity Flashcards
is it easy to track food adulteration?
No
give some examples of food adulteration
Adding an ingredient of lesser value (melamine in milk)
Adding colour or flavor to mask a defect
Using a species of lesser value (cow milk used to dilute goat milk, horse meat instead of cow meat)
Using an ingredient from an “off-label” geographic location (i.e. using Asian oysters, but selling the oysters as Canadian oysters)
What is food security?
Food Security is defined as access to sufficient calories on a daily basis
Why food safety is a food security issue
Food safety is a food security issue since contaminated food cannot be eaten and may threaten the food supply
What is food bioterrorism; give one example
Food bioterrorism is intentional contamination of food for economic gains or to cause harm
To prevent biological contamination of concern for food, what system is used
hazard analysis critical control point (HACCP)
Two ways foodborne illness can originate
- Failure of control systems (like HACCP, and then as in lecture about foodborne pathogens)
- Or intentional contamination
What was the biggest bioattatack in US?
Food brone, when someone sprayed a cocktail of Salmonella in a food buffet.
Why it is difficult to assess of interventional for intentional food contamination are good or bad?
It is difficult to assess if interventions are successful at minimizing risk of intentional contamination without demonstrating a failed attack
The chance of an attack is exceedingly low, and therefore, stakeholders are understandably reluctant to invest resources to protecting against such events
What is used to somewhat assess the degree to which the intervention reduces vulnerability?
•Therefore, now the approach is to evaluate the degree to which the intervention reduces the vulnerability of each system within the overall food supply infrastructure:
- Analyze the vulnerability of an operation within the food system
- Deploy an intervention
- Analyze the vulnerability again
Does the approach of evaluating each individual component is economically justified?
No
•There are two sets of risk management tools to help with individual component vulnerability:
- Operational Risk Management (ORM)
- Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability (CARVER)
What is ORM
•ORM is loosely defined as a function of the severity of the failure and the probability of the failure
Five steps in ORM
- Identify the hazards
- Assess the potential consequences of the hazards
- Determine which risks to manage with which interventions
- Implement the interventions
- Assess the success of the interventions
Is severity and probability is evaluated on the same scale in ORM
No