Biosecurity Flashcards
is it easy to track food adulteration?
No
give some examples of food adulteration
Adding an ingredient of lesser value (melamine in milk)
Adding colour or flavor to mask a defect
Using a species of lesser value (cow milk used to dilute goat milk, horse meat instead of cow meat)
Using an ingredient from an “off-label” geographic location (i.e. using Asian oysters, but selling the oysters as Canadian oysters)
What is food security?
Food Security is defined as access to sufficient calories on a daily basis
Why food safety is a food security issue
Food safety is a food security issue since contaminated food cannot be eaten and may threaten the food supply
What is food bioterrorism; give one example
Food bioterrorism is intentional contamination of food for economic gains or to cause harm
To prevent biological contamination of concern for food, what system is used
hazard analysis critical control point (HACCP)
Two ways foodborne illness can originate
- Failure of control systems (like HACCP, and then as in lecture about foodborne pathogens)
- Or intentional contamination
What was the biggest bioattatack in US?
Food brone, when someone sprayed a cocktail of Salmonella in a food buffet.
Why it is difficult to assess of interventional for intentional food contamination are good or bad?
It is difficult to assess if interventions are successful at minimizing risk of intentional contamination without demonstrating a failed attack
The chance of an attack is exceedingly low, and therefore, stakeholders are understandably reluctant to invest resources to protecting against such events
What is used to somewhat assess the degree to which the intervention reduces vulnerability?
•Therefore, now the approach is to evaluate the degree to which the intervention reduces the vulnerability of each system within the overall food supply infrastructure:
- Analyze the vulnerability of an operation within the food system
- Deploy an intervention
- Analyze the vulnerability again
Does the approach of evaluating each individual component is economically justified?
No
•There are two sets of risk management tools to help with individual component vulnerability:
- Operational Risk Management (ORM)
- Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability (CARVER)
What is ORM
•ORM is loosely defined as a function of the severity of the failure and the probability of the failure
Five steps in ORM
- Identify the hazards
- Assess the potential consequences of the hazards
- Determine which risks to manage with which interventions
- Implement the interventions
- Assess the success of the interventions
Is severity and probability is evaluated on the same scale in ORM
No
Scales for probability and severity in ORM: make an assessment for the salad and salmonella case
Probability: very high
Severity: medium
What do you do after ORM probability and severity was assessed
•Through a simple charting exercise, a team can evaluate each of the vulnerabilities and then rank them in terms of greatest risk if a catastrophic event were to occur
Then reassessment happens
•Successful utilization of OMR (does/ does not) require that sensitive details on potential agents be discussed
•Only general characteristics need to be known, i.e. how much of a contaminant could be added to a product, and if there are potential mitigation steps downstream such as thermal treatments or filtration
• is a process used to evaluate the vulnerability of a food operation system by evaluating each node within the system
Name
Carver shock
7 elements of CARVER+shock and explain them
in terms of priority what type of nodes CARVER+shock can have
High and low risk
What is the second step in CARVER+Shock system
•The second step is to evaluate the food facility and identify unique nodes, and each node when taken in total should represent the entire production system
It is a lot of work to identify key steps or nodes for intervention when assessing a processing pathway: is there a way to help?
•The FDA and HC prepare specific guidance documents to help food processing facilities protect against specific microbiological (and chemical) agents
Can an agent that is danger in one case can be a not dangerous in another?
•___an approach for evaluating detection and diagnostic system intervention options. What approach, basis