Biosecurity, Food adulteration and Food supply Protection Flashcards
Is food adulteration easy to tract?
No it is hard to track and detect
Food adulteration:
mean that a food product fails to meet legal standards
Give examples of food adulterations?
- adding an ingredient of lesser value (melamine in milk)
- adding colour or flavour to mask a defect
- using a species of lesser value (horse meat instead of cow meat)
- using an ingredient from an off-label geographic location
Food security:
is defined as access to sufficient calories on a daily basis
Food safety is a ____________ issue since contaminated food cannot be eaten and may threaten the food supply
food security
Food bioterrorism is :
intentional contamination of food for economic gains or to cause harm
For control of traditional biological contaminants of concern for food safety, the _____________________ is used
the hazard analysis critical control point (HACCP) system is used
Foodborne illness is generally due to a system failure that enables the _________, ________, and ________ of the contaminant to reach levels high enough to cause harm
introduction
growth
survival
Foodborne illness from intentional contamination results not from a system failure but from _______________ on a system that defeat the in-place controls
intentional attacks
What happened in the US in 1994 :
- largest bioterrorist attack by the Rajneeshee (salmonella salsa spread on the food at buffet-style restaurants)
- goal was to make enough locals sick so that the cult could sway an election
What are the 2 sets of risk management tools to help with this:
- Operational Risk Management (ORM)
- Carver + Shock
ORM is loosely defined as a:
function of the severity of the failure and the probability of the failure
What are the 5 steps of the ORM process for identifying and managing risks:
1) identify the hazards
2) assess the potential consequences of the hazards
3) determine with risks to manage with which interventions
4) implement the interventions
5) assess the success of the interventions
__________ and ________ are evaluated on separate scales
probability (very high to very low) and severity (very high to low)
CARVER + Shock is a process used to:
evaluate the vulnerability of a food operation system by evaluating each node within the system