TACCP ( Threat Assessment Critical Control Point ) 2020.
TACCP is a management process to designed to defend a food supply chain from the threat of intentional adulteration.
- TACCP aligns with HACCP, but has a different focus .
- TACCP needs input from different areas of an organization.
- TACCP & VACCP both are different .
Steps of TACCP :
- Forma cross-functional implementation team
- identify and access potential threats(economic, ideologic, behavioral) against the organization, operational site and products.
- Develop flow charts for the food supply chain.
- Identify where the vulnerable points are in the supply chain for specific threats.
- Evaluate risk and priorities these threats and vulnerability using an impact and likelihood matrix to categories the overall risk.
- access the need for an additional control that that detect or prevent such threat.
- Keep records of assessment and findings.
- Keep a watch on development trends and issues from a global perspective and review the plan periodically, at least annually or when a change or incident occurs.
TACCP Focus on/Aim of TACCP :
- Reduce the chance and impact of a deliberate attack.
- Protect organizational reputation.
- Reassure customer and the public that proportionate steps are in place to protect food.
- Demonstrate that reasonable precautions are taken and due diligence is exercised in protecting food.
Type of TACCP /TACCP Examples:
- Economically motivated adulteration (EMA)
- Malicious contamination
- Extortion
- Espionage
- Counterfeiting
- Cyber crime
EMA (Economically Motivated Adulteration) :
It is also known as food fraud done for the economy gain. ema is the "fraudulent, intentional addition of the substances for the purpose of increasing the apparent value of the products.
example of ema is one incident happened in china melamine adulteration of dairy products.
to stop all the fraudulent activity ema need some innovative methods to detect all these adulteration easily.
Malicious Contamination of Food :
In the late 1990's two women's went to a family restaurant & ordered one ice cream dessert and find piece of glass(physical hazard) in there ice cream. This scam was also used as a case study for food safety training.
Extortion Contamination of Food :
In 1990, a former police officer was convicted of extortion after contaminating baby foods with glass and demanding money from the multi-national manufacturer.
Espionage Contamination of Food:
In 2014, Reuters reported that a women was charged in the USA with attempting to steal patented U.S seed technology as part of a plot to smuggle types of specialized corn for use in china.
Counterfeiting Contamination of Food :
In 2004, four man died of alcohol poisoning in Guangdong. Authorities in the local health department suspected that the maker of the fake liquor blended industrial alcohol & rice wine, & closed several unlicensed liquor manufacturer.
Cyber Crime of Food:
Agroterrorism situation may occurs when hackers contaminate food by taking control over automated system & creating a subsequent uproar among population.
TACCP Process :
15 steps of process may indicated as follows :
- Assess new information.
- Identify and access threats to organization.
- Identify and access threats to operation .
- Choose product.
- Identify & access threats.
- Flow chart of product supply chain.
- Identify staff & vulnerability chain.
- Impact of threats identification.
- Identify supply points which are more critical.
- Determine control procedure.
- Likelihood VS Impact = Priority.
- Identify who carry out.
- Decide & implement necessary controls.
- Review.
- Monitor horizontal scans and emerging risks.
Threat Assessment Scoring :
likelihood Score Impact
Very high chance 5 Catastrophic
High chance 4 Major
Some chance 3 Significant
May happen 2 Some
Unlikely to happen 1 Minor
Comments
Post a Comment
If you have any doubt please let me know...