I believe that everyone involved in food safety is already familiar with the term “food defence.” Food defence is the protection of food from intentional contamination by chemical, physical, biological, or radiological agents with the intent to cause harm. Food defence is an important element for protecting food from potential external and internal threats. How can companies protect themselves from intentional contamination? Companies are required to conduct a hazard analysis and review all potential threats to food safety, then implement preventive measures to truly protect their food products. More about this in our article:
Basic Concepts (Requirements) that Companies Must Meet Regarding the Implementation of Food Defence Strategies
According to: Mitigation Strategies to Protect Food Against Intentional Adulteration: Guidance for Industry (Office of Analytics and Outreach, Food Defence and Emergency Coordination Staff, in the Center for Food Safety and Applied Nutrition at the U.S. Food and Drug Administration), to develop an adequate food defence plan, the following concepts must be understood:
• Intentional adulteration (IA) – intentional falsification, which includes:
For a company to protect itself from all potential (intentional) threats to product safety, it is necessary to prepare a written food defence plan, which includes:
Vulnerability Assessment
Vulnerability assessment is a core component of your overall food defence plan. Vulnerability assessments can be conducted using a selected methodology. Preliminary steps to conduct a vulnerability assessment include:
There are no mandatory requirements for which methodology you should choose, but each hazard assessment must consider the following:
KAT Methodology
The KAT methodology – Key Activity Types (KAT) – was developed by the FDA, where, through more than 50 vulnerability assessments, the most vulnerable activities were identified, regardless of the type of food.
The four KATs are:
Receiving and unloading bulk liquids is one of the four key activities because if a contaminant is added to the liquid, there is a significant possibility that it will mix into the liquid due to significant splashing, movement, or turbulence associated with the receiving or unloading activity. This does not apply to liquids transported in sealed containers or packaging, as the liquid does not use the vehicle as a container for bulk cargo.
Storing and handling liquids includes:
These activities fall into the four key activities because if a contaminant is introduced, there is a high likelihood of it mixing with the liquid due to the existing mixing process applied when, for example, liquid enters or exits a tank or when dosing liquid ingredients.
Handling secondary ingredients includes any point, step, or procedure where people manipulate dry or liquid secondary ingredients (e.g., inclusions, minor ingredients, processing aids, and food additives) before or during their addition to the product flow. These are key activities because a contaminant could be intentionally introduced into a relatively small quantity of an ingredient and thus make its way into the final product.
Mixing and similar activities include points, steps, or procedures where the primary purpose or result is:
These are key activities because a potential contaminant successfully added at one of these steps would generally be easily dispersed throughout the product due to the nature of the activity.
The methodology involves identifying the four key activities (with a written explanation of why they were identified), followed by conducting a vulnerability assessment and implementing mitigation strategies.
Process steps that do not fit into the four key activities do not require mitigation strategies.
If you would like to learn more about KAT (and other food defence methodologies), feel free to contact our Agency for assistance!!!