• Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Archives for customers requirements

12th June 2016 by Karen Constable

Vulnerability assessment methods

There are two general approaches to performing a vulnerability assessment for food fraud.

But first…. for the purposes of this page, a vulnerability assessment is a risk-assessment-style evaluation of a food product or ingredient’s vulnerability to food fraud.  For information about food defense vulnerability assessments (intentional adulteration vulnerabilities), click here.

The two approaches are (1) a conventional risk assessment model or (2) based on the recommendations of the British Retail Consortium (BRC) in their guidance document Understanding Vulnerability Assessment (2015)

Food fraud vulnerability assessment Food fraud vulnerability assessment BRC

The conventional method is a combination of the likelihood of something occurring versus consequences if that thing occurs.  This method is recommended for all types of food businesses.  It allows businesses to identify their most vulnerable ingredients, products and brands and provides an excellent framework to prioritise mitigation strategies.

The second method is recommended for businesses wishing to meet the requirements of British Retail Consortium (BRC) Food Safety Standard Issue 7 and Issue 8 (clause 5.4.2).  The BRC method does not address the risks from all types of food fraud; it only addresses the risk from adulteration and substitution of raw materials and ingredients.  Therefore it is not recommended for businesses that need to meet the requirements of other GFSI food safety standards such as FSSC 22000 Version 4 (clause 2.1.4.6) or SQF Edition 8.  What are these acronymns?

For more information about how to conduct a vulnerability assessment, take a look at Vulnerability Assessments; What? Why? How?

Vulnerability Assessment Tools
Review my assessment
Prepare an assessment for me

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Learn, VACCP, Vulnerability Assessments Tagged With: audit, auditing, BRC, customers requirements, economically motivated adulteration, food fraud, FSSC, GFSI, VACCP

16th November 2015 by foodfraudadvisors

Vulnerability assessments are a waste of time according to this investigator

Vulnerability assessments are a hot topic in food safety at the moment, with Global Food Safety Initiative (GFSI) food safety standards set to include requirements for documented food fraud vulnerability assessments in the near future.  Most food safety and food integrity experts believe that vulnerability assessments are an important first step towards preventing fraudulent foods from reaching consumers.   However, in an interview with Food Safety News, Mitchell Weinberg, food fraud investigator and CEO of Inscatech describes food fraud vulnerability assessments as “frankly… a little bit of a waste of time.”  Mr Weinberg says that a food fraud vulnerability assessment is essentially about recording what you already know.  He explains that if a business is sourcing a food ingredient from a developing country, they should already know that it is more likely to be affected by fraud than if sourced locally.  Likewise, high value and high volume materials are more attractive to fraudsters.  Weinberg tells the interviewer:

“Just use common sense, figure out where the problem is, check it out… trust but verify.“

Weinberg is right; creating documented risk assessments of any kind is simply an exercise in writing down what we already know.  And common sense should be at the core of any risk assessment.  So is there any value in a documented vulnerability assessment?  

Absolutely!

  • A documented assessment is a record of who thought of what and when they thought of it.  It is evidence that fraud has been considered; it can be used to check that common sense was used in that consideration.  It can be audited, reviewed and updated.  It can be shared.
  • The process of creating a documented assessment can serve as a prompt to identify gaps in knowledge and provide an incentive to ‘fill in the gaps’.
  • A documented vulnerability assessment can be used to transfer knowledge.  Weinberg says creating a written assessment is making a record of what you already know; that is exactly what is needed when the person who made the assessment changes jobs or has to explain supply chain risks to a stubborn Purchasing Manager.
  • Most food businesses manufacture hundreds of food products and many more hundreds of ingredients; comparing the vulnerability assessments of different products and materials is an effective way to prioritise fraud prevention actions.  While the ultimate aim is for no product to be compromised ever, we all have to start somewhere.

Read more about Vulnerability Assessments here.

To view the interview with Mitchell Weinberg, click here.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Food Fraud, VACCP, Vulnerability Assessments Tagged With: audit, BRC, customers requirements, detection, economically motivated adulteration, EMA, food fraud consultant, integrity, supply chain, VACCP

8th August 2015 by foodfraudadvisors

Why should I care about food fraud?

We care about food fraud

… because Aussie farmers who work hard to grow top quality specialty products suffer huge losses each time someone fraudulently passes off an inauthentic product as their own.  Read the story of East Gippsland farmer Peter Treasure whose Wuk Wuk brand beef has been exploited here.

…. because of Cheznye Emmons who was 23 when she died after drinking fake gin in Sumatra.  Read her story here.

… because your customers care about it.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Food Fraud, Impact of Food Fraud Tagged With: customers requirements, death from food fraud, food fraud, victim, victim of food fraud

MORE FROM FOOD FRAUD ADVISORS

Preventing food fraud: testing is not the answer

Fraudulently adulterated food is receiving a lot of attention at the moment. While it is widely acknowledged that food … [Read More...]

Honey Fraud This Month: The Good, The Bad and The Ugly

Honey authenticity is all over the (food fraud) news this month.  There’s good news.  And bad. Here’s what's … [Read More...]

The Cost of Deception (the not-so-sweet-story of an ice cream company’s food fraud)

Food fraud takes many forms.  When a food company makes deceptive claims about its products to gain an economic … [Read More...]

Nutraceuticals; a growing risk

A nutraceutical is a food or food component that is designed to provide health benefits when ingested.  The term is … [Read More...]

Investigating susceptibility to food fraud

This page contains information and links to help you investigate, understand and summarise incidences of food fraud that … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2020 Food Fraud Advisors · All Rights Reserved · Privacy Policy

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.