Preparing for the Intentional Adulteration rule in FSMA is an uncertain business because the final rule is not yet published. But, there are things you can and should be doing now to ensure your food defense plan is FSMA proof. In this webinar, you will:
- Understand what is expected by FSMA before conducting your vulnerability assessments
- Gain new insights on FDA terms and helpful tips as you prepare a food defense strategy
- Discover tools you can use to conduct a food defense vulnerability assessment that complies with FSMA
1. Understand what is expected by FSMA before conducting your vulnerability assessments
The term “Vulnerability Assessment” seems like a simple concept, but it has a special meaning according to the draft Intentional Adulteration rule. By understanding that meaning you can get ahead in your preparations. It is critical to know what is intended by the FDA and their requirements on vulnerability assessments.
Will your vulnerability assessments be approved by the FDA? Learn why two common ways of conducting vulnerability assessments are completely different than what is expected by FSMA. Find out the right approach to conducting vulnerability assessments to help mitigate risks and maintain compliance.
Hazard Analysis and Critical Control Point (HACCP) is a process that many of you are familiar with. It is an important and effective process for maintaining food safety and the FDA has leveraged this approach to address food defense, but there are important differences. You will learn the three ways that Vulnerability Assessment is similar to HACCP, and three ways it is different.
2. Gain new insights on FDA terms and helpful tips as you prepare your food defense strategy
The FDA uses several specific additional terms in the Intentional Adulteration rule: “Actionable Process Step”, “Focused Mitigation Strategies”, and four “Key Activity Types”. Discover real world examples for each of these terms and how to apply the best method to fit your specific situation:
- 2 alternatives permitted by the draft rule to determine your Actionable Process steps
- 2 rules of thumb to select and confirm the Actionable Process Steps
- 3 methods to choose your Focused Mitigation Strategies
- 3 three hints to getting the most out of the FDA’s online mitigation strategies database
3. Discover tools you can use to conduct a food defense vulnerability assessment that complies with FSMA
The FDA has published two tools to use for a Vulnerability Assessment: CARVER + Shock and the Food Defense Plan Builder tool. Learn the strengths and shortcomings of each tool, and find out about some helpful hints for how to use each of them.
When conducting a Vulnerability Assessment, get to know the difference between the “Big V” vulnerability and the “Little v” vulnerability. Learn the difference between accessibility and vulnerability as those terms are used in the tools.
FSMA is here and the Intentional Adulteration rule will be in force next year. Get ready by learning about how to best prepare for the final rule by participating in the first of a four part webinar series on food defense sponsored by Tyco Integrated Security. This first session will focus on the first step, conducting a vulnerability assessment, and will feature Ned Mitenius, Founder and President of Periscope Consulting, who built the models and exercises which became the FDA’s Food Defense Plan Builder tool.
Keywords: Food Defense, FDA, Food Safety