Skip to main content

TACCP ( Threat Assessment Critical Control Point ) 2020.

TACCP ( Threat Assessment Critical Control Point ) 2020.

TACCP is a management process to designed to defend a food supply chain from the threat of intentional adulteration.

  • TACCP aligns with HACCP, but has a different focus .
  • TACCP needs input from different areas of an organization.
  • TACCP & VACCP both are different .

Steps of TACCP :

  1. Forma cross-functional implementation team
  2. identify and access potential threats(economic, ideologic, behavioral) against the organization, operational site and products.
  3. Develop flow charts for the food supply chain.
  4. Identify where the vulnerable points are in the supply chain for specific threats.
  5. Evaluate risk and priorities these threats and vulnerability using an impact and likelihood matrix to categories the overall risk.
  6. access the need for an additional control that that detect or prevent such threat.
  7. Keep records of assessment and findings.
  8. Keep a watch on development trends and issues from a global perspective and review the plan periodically, at least annually or when a change or incident occurs.

TACCP Focus on/Aim of TACCP :

  • Reduce the chance and impact of a deliberate attack.
  • Protect organizational  reputation.
  • Reassure customer and the public that proportionate steps are in place to protect food.
  • Demonstrate that reasonable precautions are taken and due diligence is exercised in protecting food.

Type of TACCP /TACCP Examples:

  1. Economically motivated adulteration (EMA)
  2. Malicious contamination
  3. Extortion
  4. Espionage
  5. Counterfeiting
  6. Cyber crime

EMA (Economically Motivated Adulteration) :

 It is also known as food fraud done for the economy gain. ema is the "fraudulent, intentional addition of the substances for the purpose of increasing the apparent value of the products.
example of ema is one incident happened in china melamine adulteration of dairy products.
to stop all the fraudulent activity ema need some innovative methods to detect all these adulteration easily.

Malicious Contamination of Food :

In the late 1990's two women's went to a family restaurant & ordered one ice cream dessert and find piece of glass(physical hazard) in there ice cream. This scam was also used as a case study for food safety training.

Extortion Contamination of Food :

In 1990, a former police officer was convicted of extortion after contaminating baby foods with glass and demanding money from the multi-national manufacturer.

Espionage Contamination of Food:

In 2014, Reuters reported that a women was charged in the USA with attempting to steal patented U.S seed technology as part of a plot to smuggle types of specialized corn for use in china.

Counterfeiting Contamination of Food :

In 2004, four man died of alcohol poisoning in Guangdong. Authorities in the local health department suspected that the maker of the fake liquor blended industrial alcohol & rice wine, & closed several unlicensed liquor manufacturer.

Cyber Crime of Food:

Agroterrorism situation may occurs when hackers contaminate food by taking control over automated system & creating a subsequent uproar among population.

TACCP Process :

15 steps of process may indicated as follows :

  1. Assess new information.
  2. Identify and access threats to organization.
  3. Identify and access threats to operation .
  4. Choose product.
  5. Identify & access threats.
  6. Flow chart of product supply chain.
  7. Identify staff & vulnerability chain.
  8. Impact of threats identification.
  9. Identify  supply points which are more critical.
  10. Determine control procedure. 
  11. Likelihood VS Impact = Priority.
  12. Identify who carry out.
  13. Decide & implement necessary controls.
  14. Review.
  15. Monitor horizontal scans and emerging risks.

Threat Assessment Scoring :

likelihood            Score       Impact

Very high chance                5               Catastrophic 
High chance                       4                Major
Some chance                      3                Significant 
May happen                       2                Some
Unlikely to happen            1                Minor


                      






Comments

Popular posts from this blog

Immunity Booster During COVID-19 (CORONA) 2020 .

Immunity Booster During  COVID-19  (CORONA) 2020 .                       To boost immunity its important to take right kind of foods in the right quantities. Foods that contains vitamin C are huge immune boosters for flue, cold and infections. Some of immune boosters are as follows: Citrus fruits Turmeric Cardamom Black Seeds Fenugreek  Clove Black Pepper Ginger Cinnamon Honey Basil Neem

Oats and Almond Cookies(Oats & Almond Benefits, Standard Recipe and Procedure)2020.

Oats and Almond Cookies(Oats & Almond Benefits, Standard Recipe and Procedure)2020. Cookies:- The word "cookies" in derived from a dutch word "koeje" which mean little cake. Cookies are baked or cooked food that is typically  small, flat and sweet. Fruits and oats cookies are prepared by using oats, tutty frutti and nuts. The scientific name of nuts is Avena sativa.Oats are good source of dietary fibers, several B vitamins and numerous dietary minerals. Benefits of Oats:- Help to lower bad cholesterol. Rich source of energy. Full of vitamin and minerals. Keep blood sugar balance. Oats for healthy heart. Oats gluten free. Benefits of Almond :- Prevent heart diseases. Prevent diabetes. Improve digestion. Strength bones. Reduce bad cholesterol. Help in weight loss. Prevent hair fall. Recipe:- Standard recipe for 1 kg. Refined wheat flour                  250 gm Oats                             

13 Vitamins : Types, Deficiency & Best sources 2020.

 13 Vitamins : Types, Deficiency & Best sources 2020. Vitamins : Vitamins are organic amino acids & fatty acids, that must be supplied to an animal in small amount to maintain health. Vitamins are required in the diet of human & animal for normal body growth. Vitamins can be obtained from the different types of foods.