Introducing our new Vulnerability Assessment Tool
Food Fraud Advisors’ sister company AuthenticFoodCo has developed the Intentional Adulteration Vulnerability Assessment Tool to help food businesses perform and document a food defense vulnerability assessment. The tool identifies vulnerabilities to intentional adulteration, which is the deliberate contamination of food with a biological, chemical, radiological, or physical agent by an individual or group of individuals with the intent to cause wide scale public health harm. (U.S. Food and Drug Administration (2019)).
A vulnerability assessment for intentional adulteration is part of a food defense plan, a set of documents that describes a food business’ decision-making processes and subsequent actions taken to prevent acts of intentional adulteration from occurring at their food facility(s).
Easy to use:
- Based on methods recommended by the U.S. FDA
- Creates a complete vulnerability assessment for a food manufacturing process
- Includes templates for mitigation strategies documentation and fundamental elements calculations
- Bonus resources including lists of ideas for mitigation strategies and challenge tests
- Comprehensive definitions page and detailed instructions for use
- Designed to meet the requirements of US FSMA Intentional Adulteration Rule
- Suitable for food defense plans in GFSI systems
- Simple to review and update
How it works:
Using the process flow chart or list of operational steps for a food product, users list and choose a food operation type from a comprehensive drop-down list in the spreadsheet (you may add you own if needed). The tool helps the user to decide if the step is a vulnerable to intentional adulteration using both the key activity types method and the three fundamental elements method as described by the U.S. FDA in the document Mitigation Strategies to Protect Food Against Intentional Adulteration: Guidance for Industry, Revised Draft Guidance (March 2019).
When all the process steps have been addressed, the user may print or export the results if desired, or save the excel file in a secure location.