Site and Supply Chain Security Management

Managing the Risk of Sabotage or Terrorist Type Events throughout your Interactions within the Food Sector

Share this:

Premium Resources

Download our Premium Site and Supply Chain Security Management Resources

LOAD ALL

Downloading a resource will add this resource to your resource subscriptions. You will be notified of future updates to this resource via email (you may unsubscribe at any time by clicking the unsubscribe link in the email notification, or to unsubscribe immediately from all update notifications, click here)

To define detail, scope and purpose.

Development

This information can be used to develop food safety and quality programs that meet the requirements of modern Regulatory, Customer and Industry Standards:

  • We take the time to explain the expectations and requirements of food safety and quality compliance as these relate to your food safety and quality programs.
  • You may choose to use our Premium Resources to build, enhance or upgrade your food safety and quality program.
  • We encourage you to share this webpage with any food compliance associates and peers you believe may benefit from our commitment to providing our users with user friendly information and resources to a achieve superior Food Compliance Culture.
  • We welcome your suggestions for additions of general or specific content through the haccp.com Contact Page.

Key Definitions for Site and Supply Chain Security Management

  • Contractor: A procured service or product provider within a food business premises.
  • Food Defense: Food Defense covers the methodologies applied to identify risk to food from acts of unsafe modifications or intentional sabotage or contamination.
  • HACCP: Hazard Analysis Critical Control Point or HACCP as it is commonly known, is a science-based risk management system, relying on identification and recognition of specific hazards, and nominates measures for their control to ensure the safety of food.
  • Product Recall: A product recall is a request to return to the manufacturer a batch or an entire production run of a product, usually due to the discovery of threatening safety issues.
  • Product Withdrawal: A product withdrawal is a request to return to the manufacturer a batch or an entire production run of a product, usually due to the discovery of non-threatening quality issues.
  • Site and Supply Chain Security Management: Site and Supply Chain Security Management covers the methods implemented to ensure adequate and appropriate control of food business security throughout the supply chain.
  • TACCP: Threat Assessment Critical Control Point or TACCP is a methodology used to prevent deliberate and intentional sabotage and espionage events and related scenarios.
  • Visitor: An invited, expected, welcomed, or accommodated visitor to a food business premises.
  • Cybersecurity Threat: A cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats may include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack methods..

Site and Supply Chain Security Management Development

When considering the development, documentation, and implementation of Site and Supply Chain Security Management within food safety and quality management systems, the following information should be considered to ensure effective outcomes:

About Site and Supply Chain Security Management

Security is a critical issue for every food industry sector and related participants. It is important to consider the potential for people to influence the safety or quality of a food product if the environment and conditions under which it is produced, handled, stored, or transported are not appropriately controlled.

Site and Supply Chain Security Management generally involves the control of potential deliberate contamination of foods by a variety of potential threats including biological, chemical, and physical hazards. Deliberate contamination of foodstuffs is a criminal activity that involves willful intent to inflict harm or damage. The motivation for deliberate contamination often includes the ability to cause serious illness and deaths following consumption of affected products. This is aligned with the desire to cause economic damage whilst including inspiring fear among the public and loss of confidence in the safety of food supply chains.

Site and Supply Chain Security should always be considered as a separate element from food safety, though elements of the two may be shared when applied to a food business. Food safety generally addresses the ‘unintentional’ contamination of food products by biological, chemical, or physical hazards. Because of the differences in applications for food safety and Site and Supply Chain Security, a HACCP Plan should not be applied as a substitute for a detailed Site and Supply Chain Security plan; however, the HACCP methodology is commonly used as a risk assessment tool to define Site and Supply Chain Security related risks.

Where the HACCP Methodology is applied for the identification and management of Site and Supply Chain Security hazards, this may be referred to as TACCP. Threat Assessment Critical Control Point or TACCP is a methodology used to prevent deliberate and intentional sabotage and espionage events and related scenarios.
Site and Supply Chain Security Management applications may include the following aspects:

  • Screening of staff members before beginning work within a food business;
  • Using a system that allows tracking of staff movements;
  • Video surveillance;
  • Securing of the food premises, to ensure only authorized staff, visitors and contractors access specified areas;
  • Using a register to track the movements of visitors and contractors;
  • Document and Data Control;
  • Facilitating visitor and contractor screening and induction training.

It is important when initiating some of the above-mentioned components, that the rights of staff, visitors, and contractors are not compromised. The requirements of Privacy legislation are commonly used as a basis for the implementation of systems that track people’s movements, especially where the use of video surveillance is concerned.

Who May Want to Contaminate or Sabotage Foods?

When evaluating the potential Site and Supply Chain Security exposure of any food business, the Senior Management should consider a large variety of people who may potentially execute an attack from both inside and outside the business operation. Potential attacks may include both opportunistic attacks by single individuals and planned attacks by organized groups.

The following listing provides some examples of people who may be motivated to contaminate or sabotage food products from both internal and external sources:

Internal Sources

  • Disgruntled employee;
  • Visitors or Contractors;
  • Temporary or casual employees;
  • Members of organized groups posing as employees.

External Sources

  • Organized groups;
  • Transport drivers;
  • Visitors or Contractors;
  • Raw Material Suppliers.

Additional threats are often identified through internal sources as perpetrators often have access to food business procedures and protocols that may make their goals more readily achievable. Food businesses should liaise with relevant regulatory authorities regarding potential local threats to their operation.

Site and Supply Chain Security Management Risk Assessment

The following may be considered when conducting a Site and Supply Chain Security risk assessment for your food business:

Define What Needs to be Protected

A clear understanding of potential threats and what needs to be protected will assist in ensuring that effective and appropriate control measures can be applied. It is important to identify the most vulnerable elements of any food business operation. Historical or current Site and Supply Chain Security incidents built from within your business and externally can be used as resources to ensure you are considering an appropriate range of potential Site and Supply Chain Security hazards.

Application of Site and Supply Chain Security Management Control Measures

The application of the Site and Supply Chain Security Management control measure within any food business operation should be applied according to the defined severity of outcomes related to each nominated control measure. As with most business management systems, it is important to consider that the identified potential Site and Supply Chain Security risks should be controlled in order from the one with the most severe potential outcomes, to the one with the least severe potential outcomes. This method generally facilitates a practical approach to resource allocation as applicable to each unique food business operation. Contemporary Site and Supply Chain Security Management protocols rely on a multi-layered approach in ensuring effective outcomes. A multi-layered approach, for example, may include elements such as:

Physical Security

Potential security measures include perimeter controls through the use of fencing, gates, guard stations, and key card or radio frequency emitting device access. All entryways, windows, vents, and delivery docks should be secured. Exterior lighting and closed-circuit camera systems may also be used to support outcomes.

Personnel Security

Staff training for Site and Supply Chain Security Management. Logging of employee entry and exit is a common method for tracing staff movements within any food business operation.

Operational Security

Employment of internal or external security monitoring and reaction contractors or consultants, security cameras, or security inspections. This may also include the application of central controls for services like airflow, water supply and electricity, and nomination of supervision for contractors working within the operational areas of the food business.

Process Security

Maintaining control over access to the process and the application of Site and Supply Chain Security Management procedures. This may include the application of tools such as Chemical Usage Inventories, which can track excessive or unauthorized chemical use which may potentially be used to deliberately contaminate foods. Receival, Dispatch, and Transport security measures may include purchasing raw materials only from designated approved suppliers, establishing controls on incoming deliveries, limiting driver access to the food business during deliveries, thorough inspection and inventory accounting of delivered materials, use of tamper-evident packaging for finished products, and the use of tamper-evident seals on incoming and outgoing transport.

Contemporary Food Safety and Quality programs and systems often include requirements for the securing of transport modules or vehicles to reduce the risk of deliberate sabotage or terrorist-type events. In such cases, transport modules or vehicles may be secured physically, or by a system that permits the real-time acknowledgment of potential tampering. An example of a physical transport security mechanism may include the physical locking of transport modules or vehicles where these can only be opened by nominated participants within the supply chain. Where security systems are used instead of physical measures, these may include the implementation of controlled tamper-proof transport seals, mandated transport protocols, and/or specified tamper-proof mechanisms for the product (rather than the transport module or vehicle).

It is generally considered best practice to ensure that any implemented Transport Security protocols, physical mechanisms, and related controls are documented and agreed upon with relevant parties to provide a consistent controlled approach. Related requirements are commonly included within Transport specifications and service agreements between the dispatching entity, the receiving entity, and any other process participants and stakeholders.

Product Security

Maintaining control over access to product and raw materials and the application of Site and Supply Chain Security Management procedures. Raw Material and product storage areas security will protect against the intentional misuse of ingredients or non-food items as food adulterants. Storage areas should be adequately secured and monitored, with access limited to authorized personnel only. Using elements such as these allows for an approach that supports Site and Supply Chain Security Management from across the entire food business operation.

Implementing a Site and Supply Chain Security Management Plan

The following elements may be considered in the implementation of a Site and Supply Chain Security Management plan:

Designation of Responsibilities

Responsibility for Site and Supply Chain Security Management should be designated to an individual with a thorough understanding of the food business operation (typically a member of the Senior Management Team). Further delegations may include specific individual responsibilities for elements of the Site and Supply Chain Security Management systems.

Site and Supply Chain Security Management Training

All staff, visitors, and contractors should be trained in relevant aspects of the Site and Supply Chain Security Management system. The purpose of security awareness training is to ensure that all relevant people are aware of their Site and Supply Chain Security Management responsibilities. Site and Supply Chain Security Management training should address system requirements including identification badges, access control protocols, access to restricted areas, protection of critical Site and Supply Chain Security Management risks, and procedures for reporting suspicious or confirmed inappropriate activities. Understanding the threat of intentional contamination and the potential outcomes of such an incident should assist staff, visitors, and contractors in ensuring the ongoing application of the prescribed Site and Supply Chain Security Management control measures.

All staff involved with the handling of food must be trained to recognize and practice good manufacturing practices and safe working procedures at all times. It is generally considered best practice to ensure all new employees complete relevant induction training before actually starting within their new position. As a base level requirement, food and personal hygiene training should be addressed for all relevant staff during the induction process. Supervisory staff may be required to undertake specific and more comprehensive food safety training in the related areas.

It is also important to consider that Visitors and Contractors may also require induction training commensurate with their interactions within any food business. Food business policies should define what induction, GMP, and personal hygiene training are required for non-staff members entering the premises.

Develop Contact Listings

Current, regularly reviewed, and updated contact listings should be maintained as an element of any Site and Supply Chain Security Management plan. Contact listings should include names, positions, departments, addresses, business and after-hours phone numbers and email addresses for key internal food business contacts, customers, regulatory departments, and officials. Contact listings should also include back-ups for instances in which the primary contacts can’t be made.

It is important to consider that an actual Site and Supply Chain Security incident may very realistically lead to a food recall or food withdrawal. Procedures and flow processes should be clearly defined to ensure a food recall or food withdrawal is facilitated where required as an outcome of a Site and Supply Chain Security incident.

Restricted Items in Specified Areas

Many materials are often prohibited in food production areas due to their potential for causing harm to consumers, particularly as deliberate contaminants. The presence of the following items in production, packaging, storage, and handling areas may be considered a significant risk:

  • Paper clips;
  • Rubber bands;
  • Thumbtacks;
  • Pins, nails, screws;
  • Steel wool or Wire wool;
  • Wood and wooden items. If wooden materials such as wooden pallets must be used, it is highly recommended that they be maintained in a good state of repair;
  • Staples;
  • Glass may be unavoidable as light fittings and as part of instruments, but can still be contained through common sense methods of control and management;
  • Packaging containers: Can cause contamination during the opening, either from external sources, or by parts of the packaging breaking lose, and contacting the food;
  • Associated physical food hazards. Ingredients such as dried goods can be sifted or screened before use to reduce the possibility of foreign matter within the packaged or stored product being transported further into the production process.

Chemical Storage, Segregation and Security

Chemicals used within food businesses must be properly stored and located with insecticides and rodenticides stored separately from cleaning compounds and other chemicals. All chemicals and pesticides must be stored separately from food, food contact surfaces, and single-use and single-service articles. In this context, the term separate does not include storage of toxic chemicals above food, food contact surfaces, single-use, and single-service articles.

The storage of chemicals must also meet local regulatory and environmental protection requirements.

Where necessary, adequate facilities for the storage and handling of food, ingredients, and non-food chemicals including cleaning chemicals, pest control chemicals, lubricants, and other maintenance chemicals must be provided.
Where appropriate, food storage and handling facilities should be designed and constructed to:

  • Permit adequate maintenance and cleaning;
  • Avoid pest access and harborage;
  • Enable food to be effectively protected from contamination during storage and handling;
  • Where necessary, provide an environment that minimizes the deterioration of food through controls including temperature and humidity.

The type of facilities required will depend on the nature of the food items being stored and handled by a food business. Where necessary, segregated and secure storage facilities should be provided for cleaning chemicals, pest control chemicals, lubricants, and other maintenance chemicals. Storage facilities for ingredients, packaging, and other materials should also be appropriately secured and adequately ventilated.

Managing Visitors and Contractors

It is paramount to food safety that visitors and contractors behave appropriately when visiting a food manufacturing business. Any visitors and contractors on the premises and their actions are the responsibility of the management.

Visitors and contractors entering a food manufacturing, processing or handling area should, where appropriate, wear protective clothing and adhere to the other personal hygiene provisions in this section. A policy to this effect should be documented, and a copy provided to each contractor and visitor before entering the site.
It is generally considered standard practice for visitors and contractors to be signed into a food business and identified by an appropriate badge or gate pass. A gate pass is a printed document that needs to be filled out by the person who wants to move out of the premises of the organization. Gate pass can be used to authorize the movement of humans, materials, and machines to or from the premises of the organization. It will help to monitor and track all the movements in an organization. Some of the most commonly used gate pass types include ‘Employee Gate Pass’ and ‘Materials Gate Pass.’ A gate pass helps an organization to get a record of the time movement and to track the person responsible for the movement. It can also prevent theft and unauthorized carrying of materials and improve discipline inside the organization. Visitors may also be required to review documented materials relating to food safety and workplace health and safety before admission to critical areas of operation. Depending on the purpose of the visit, visitors, contractors and internal staff not attired appropriately may be required to wear a hygienic outer covering such as a fresh lab coat or full uniform while visiting food production areas. Visitors and contractors should be accompanied by an authorized staff member at all times unless they have conducted appropriate induction training and have passed established medical and security screening protocols.

As elements of established site security protocols, employees of the business should be encouraged through specified training to challenge anyone seen within operational areas of the site if they are not appropriately identified or accompanied by an authorized person.

For higher-risk or larger food businesses, it is common for a Visitor and Contractor induction process to be developed, documented, and implemented to ensure the ongoing compliance of Visitors and Contractors to the food business. This is particularly important where, for example, maintenance contractors are used long-term and are permitted to work unaccompanied within operational areas of the food business. In this context, it is important to consider that Visitors and Contractors, though they are expected to comply with the standard policies and procedures, may not appreciate their legal responsibilities in meeting such requirements.
In instances where, for example, maintenance contractors are used long term, it is also common for re-induction to be scheduled, conducted, and recorded to ensure ongoing compliance with the nominated Visitor and Contractor requirements.

It is also common for labor hire companies to conduct relevant training and induction processes on behalf of the company which they will provide to the temporary staff. In this case, a food business must be using labor supplied through a company responsible for relevant and induction training to verify and validate the facilitation and outcomes of such activities. This is commonly considered as an element of the approved supplier of service provider programs.

Cyber Security Threats

Cyber Security threats typically refer to the possibility of a successful cyber-attack that aims to gain unauthorized access, damage, disrupt, or steal an information technology asset, computer network, intellectual property, or any other form of sensitive data. Cyber Security threats can come from within an organization by trusted users or externally from remote locations by unknown parties.

Cyber Security threats can impact the food supply chain in many ways. Cyber threats could impede the movement of materials and ingredients from suppliers to manufacturers. Shipments from manufacturers to customers could be delayed or re-routed to the wrong locations. A cyber threat could shut down internal systems and even jeopardize the integrity and safety of food products. Cybersecurity processes are critical and essential to keep systems and processes running, food-safe and the supply chain intact. There are many types of cyber threats the food sector needs to be aware of, including:

  • Web skimming: Web skimming (also known as e-skimming, card skimming, or Mage cart attacks) refers to cyberattacks in which hackers implant malicious computer code into websites and third-party supplies of digital systems to steal credit card information. Online sales of consumer-packaged goods, especially food, continue to grow and push manufacturers to manage a different value chain than in the past. This trend has forced many of these producers to enter e-commerce sales in addition to selling through retail channels.
  • Ransomware: Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn’t pay in time, the data is gone forever or the ransom increases. Ransomware attacks can result in millions of compromised internal records and customer data. When this happens, manufacturing operations are typically halted, resulting in lower earnings due to lost productivity and sales. Overall, the supply chain becomes interrupted and disconnected. In addition to the disruption of the business that was breached, peripheral businesses and operations are impacted as well. Disruptions to operations and supply chain flow could lead to expired food at all inventory levels, resulting in unnecessary food waste and millions of dollars of lost profit.
  • ICS/SCADA Malware: This type of attack breaks into Industrial Control Systems (ICS) and the Supervisory Control and Data Acquisition Systems (SCADA) that run and manage manufacturing facilities. Many ICSs used in the food industry are quite old, highly customized, and were not originally designed with security in place. The focus during these types of attacks is to either bring the factories and operations to a complete halt or contaminate the food supply. This can be done by altering bills of materials and recipes to drastically change ingredient quantities or to add new ingredients to create a toxic product. This vulnerability has been exacerbated in the food industry by manufacturers’ increasing reliance on automated industrial control systems to process, store and manage large product volumes.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Development requirements in relation to their items.

Site and Supply Chain Security Management Development Key Points

  • Site and Supply Chain Security Management programs must be developed to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • The Senior Management of your business facilitate a commitment to ensuring adequate resources to the development of your Site and Supply Chain Security Management program;
  • Should you require additional resources for the development of Site and Supply Chain Security Management program elements, please discuss this with the relevant Senior Management representative;
  • A properly developed Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly-developed Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To establish the developed detail in a viewable format to facilitate information.

Documentation

Document: A document provides guidance and/or direction for performing work, making decisions, or rendering judgments that affect the safety or quality of the products or services that customers receive.

Documented policies, procedures, work instructions, and schedules form the basis of any food safety and quality management system. The following documentation formats may be considered to ensure ongoing compliance with specified requirements for Site and Supply Chain Security Management:

  • Site and Supply Chain Security Management policy;
  • Site and Supply Chain Security Management development procedures;
  • Site and Supply Chain Security Management implementation procedures and work instructions;
  • Site and Supply Chain Security Management monitoring procedures;
  • Site and Supply Chain Security Management corrective and preventative action procedures;
  • Site and Supply Chain Security Management verification schedule;
  • Site and Supply Chain Security Management verification procedures;
  • Site and Supply Chain Security Management validation schedule;
  • Site and Supply Chain Security Management validation procedures;
  • Site and Supply Chain Security Management training procedures.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Documentation requirements in relation to their items.

You may wish to visit the Site and Supply Chain Security Management Templates section of haccp.com for examples of Site and Supply Chain Security Management documentation, record, and resource formats commonly applied within food safety and quality systems.

Site and Supply Chain Security Management Documentation Key Points

  • Site and Supply Chain Security Management programs must be documented to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • All documented Site and Supply Chain Security Management program elements must be controlled to ensure compliance;
  • Key documented Site and Supply Chain Security Management program elements should be available to your business’ team at all times to ensure they can facilitate required tasks;
  • A properly documented Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly documented Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To facilitate the application of the documentation.

Implementation

Implementation: Implementation is the application of documented food safety and quality system elements into the actual business operation.

The implementation of Site and Supply Chain Security Management within any food business requires genuine commitment from senior management, staff, and visitors to ensure the nominated goals of implementation are achievable on an ongoing basis. It is a step that requires significant planning and consideration of general and specific food business circumstances to ensure the outcomes of Site and Supply Chain Security Management do not negatively impact the safety and quality of the food items dispatched from the business.

Implementation of Site and Supply Chain Security Management must include a clear definition of responsibilities and authorities for all levels of participation by senior management, staff, and visitors to the site.

When implementing Site and Supply Chain Security Management within a food safety and quality system, you may wish to consider the following requirements before completion:

  • Communication and display of the Site and Supply Chain Security Management policy;
  • Completion of Verification and Validation of Site and Supply Chain Security Management development procedures;
  • Availability of Site and Supply Chain Security Management implementation procedures and work instructions;
  • Availability of Site and Supply Chain Security Management monitoring procedures and record templates where applicable;
  • Availability of Site and Supply Chain Security Management corrective and preventative action procedures and record templates where applicable;
  • Availability of the Site and Supply Chain Security Management verification schedule;
  • Availability of Site and Supply Chain Security Management verification procedures;
  • Availability of the Site and Supply Chain Security Management validation schedule;
  • Availability of Site and Supply Chain Security Management validation procedures;
  • Completion of Site and Supply Chain Security Management training procedures;
  • Completion of product design and development requirements related to Site and Supply Chain Security Management;
  • Completion of process design and development requirements related to Site and Supply Chain Security Management;
  • Completion of training for team members who have responsibilities and involvement within Site and Supply Chain Security Management;
  • Completion of competency approval for team members who have responsibilities and involvement within Site and Supply Chain Security Management.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Implementation requirements in relation to their items.

Site and Supply Chain Security Management Implementation Key Points

  • Site and Supply Chain Security Management programs must be Implemented to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • Your Site and Supply Chain Security Management program must be fully implemented as per relevant documented Policies, Procedures, and Work Instructions;
  • The implementation of Site and Supply Chain Security Management requires a commitment to the provision of resources by the Senior Management of your business;
  • A properly implemented Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly implemented Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To review, confirm and document evidence of the implementation against documented limits.

Monitoring

Monitoring: Monitoring is the act of reviewing and confirming measurable parameters of a defined process or product status.

Monitoring requirements within food industry sectors are generally identified against limits of acceptability defined within HACCP plans, implementation procedures, and work instructions. Monitoring usually includes some element of record-keeping, which may be maintained manually or through digital systems. It is important to consider that advancements in technology have spawned many systems and processes which are self-monitored and or self-adjusted when variances are identified. Regardless of the system used; The goal of any monitoring activity is to provide sufficient evidence that any limit of acceptability has been met.

Traditional Site and Supply Chain Security Management monitoring requirements include manual recording and the application of corrective actions when the results of monitoring are found to be outside acceptable limits. Corrective Actions should also generally be strongly linked to the monitoring process where applied to ensure full traceability of the applied actions.

Common monitoring activities and record formats may be applicable to Site and Supply Chain Security Management:

  • Staff, Contractor, and Visitor Log: Methods through which staff, visitors, and contractors have access to operational areas of a food business should be recorded and monitored to ensure appropriate outcomes. It is important to consider that all entries and exits, to and from the operational food businesses should be logged to ensure full traceability of those moving through such areas.
  • Scheduled and recorded Site, Process, and Product Inspections are often used to facilitate real-time monitoring of the effectiveness of Site and Supply Chain Security applications.
    If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Monitoring requirements in relation to their items.
    You may wish to visit the Site and Supply Chain Security Management Templates section of haccp.com for examples of Site and Supply Chain Security Management documentation, record, and resource formats commonly applied within food safety and quality systems.

Site and Supply Chain Security Management Monitoring Key Points

  • Monitoring provides real-time confirmation and evidence that your risk-based FS&Q Controls are effectively implemented;
  • Site and Supply Chain Security Management programs must be monitored to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • Monitoring of Site and Supply Chain Security Management must be facilitated as per relevant documented Policies, Procedures, and Work Instructions;
  • Nominated monitoring records for Site and Supply Chain Security Management must be maintained as per relevant documented Policies, Procedures, and Work Instructions;
  • A properly monitored Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly monitored Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To apply “real time” interventions to documented monitoring limits.

Corrective Action and Preventative Action

Corrective Action: Corrective action is mandatory action to be taken when a deviation to the Quality System occurs, particularly in relation to a Critical Control Point.
Preventative Action: At any step in the process where a hazard has been identified, preventive action must be put into place to prevent re-occurrence.

Corrective Action and Preventative Action is implemented to ensure that any identified non-conformance issues are documented, investigated, and rectified within appropriate time-frames. Corrective action is any action applied to regain control over a product, process, policy, or procedure that has been identified as being non-conforming or outside nominated limits of acceptability. Preventative action is any action applied to prevent any identified non-conformance from reoccurring.

The outcomes of corrective and preventative actions should result in regained process control after effective application. Specified corrective actions are commonly linked to the HACCP Plans and the food business certification process.

Below are Corrective Action and Preventative Action examples which may be associated with Site and Supply Chain Security Management related non-conformance:

  • Review of the Site and Supply Chain Security Management policy;
  • Review of Site and Supply Chain Security Management development procedures;
  • Review of Site and Supply Chain Security Management implementation procedures and work instructions;
  • Review of Site and Supply Chain Security Management monitoring procedures;
  • Review of Site and Supply Chain Security Management corrective and preventative action procedures;
  • Review of the Site and Supply Chain Security Management verification schedule;
  • Review of Site and Supply Chain Security Management verification procedures;
  • Review of the Site and Supply Chain Security Management validation schedule;
  • Review of Site and Supply Chain Security Management validation procedures;
  • Review of Site and Supply Chain Security Management training procedures;
  • Re-training in Site and Supply Chain Security Management;
  • Review of management review activities to include Site and Supply Chain Security Management as an agenda item;
  • Initiation of ‘product hold’ procedures where safety or quality may be compromised;
  • Initiation of a product recall or product recall procedures where investigations show that there is a substantial safety and or quality risk to the released product;
  • Contacting stakeholders including customers regarding any confirmed or potential Site and Supply Chain Security Management concerns involving their product.

When investigating the root cause of observed non-conformances or customer complaints where product contamination is involved, it is important to consider that the root cause of such a scenario may be due to a deliberate contamination event. Records of the investigation Corrective Action and Preventative Action should detail considerations of potential deliberate sabotage or contamination as part of a holistic process.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Corrective Action requirements in relation to their items.

You may wish to visit the Corrective Action and Preventative Action section of haccp.com for examples of best practice applications for this food safety and quality system element.

Site and Supply Chain Security Management Corrective Action and Preventative Action Key Points

  • The implementation of Corrective Action and Preventative Action provides confidence that your FS&Q Program is effectively implemented and that FS&Q criteria is being met;
  • Where deviations or variations are observed, Corrective Action and Preventative Actions must be facilitated to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • Corrective Action and Preventative Action of Site and Supply Chain Security Management must be facilitated as per relevant documented Policies, Procedures and Work Instructions;
  • Records of Corrective Action and Preventative Action must for Site and Supply Chain Security Management be maintained as per relevant documented Policies, Procedures, and Work Instructions;
  • Proper application of Corrective Action and Preventative Action for your Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • Poor application of Corrective Action and Preventative Action for your Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To review and confirm documented monitoring and corrective actions against documented parameters.

Verification

Verification: The act of reviewing, inspecting, testing, checking, auditing, or otherwise establishing and documenting whether items, processes, services, or documents conform to specified requirements.

Verification is the detailed review of all food safety and quality system elements to confirm that they are effectively developed, documented, implemented, monitored, and reviewed. All food safety and quality system elements, including documented policies, procedures, training, HACCP plans, and their operational applications must be verified on an ongoing scheduled basis. The verification process commonly includes a defined schedule for which verification activities are required, how often they are conducted, who is responsible, and detailed documented procedures for each nominated verification activity.

The general goal of an established verification process is to ensure any systemic non-conformance issues are identified and rectified within an appropriate time frame. When non-conformance issues are identified through the verification process, Corrective Actions and Preventative Actions should be implemented to ensure they do not impact the effectiveness of the food safety and quality system.

The following examples of verification activities may be applicable to Site and Supply Chain Security Management:

  • Review of the Site and Supply Chain Security Management policy;
  • Review of Site and Supply Chain Security Management development procedures;
  • Review of Site and Supply Chain Security Management implementation procedures and work instructions;
  • Review of Site and Supply Chain Security Management monitoring procedures;
  • Review of Site and Supply Chain Security Management monitoring records;
  • Review of Site and Supply Chain Security Management corrective and preventative action procedures;
  • Review of the Site and Supply Chain Security Management verification schedule;
  • Review of Site and Supply Chain Security Management verification procedures;
  • Review of the Site and Supply Chain Security Management validation schedule;
  • Review of Site and Supply Chain Security Management validation procedures;
  • Review of Site and Supply Chain Security Management training procedures;
  • Review of Site and Supply Chain Security Management performance since the last review and historically;
  • Analytical testing of product or process to ensure the effectiveness of Site and Supply Chain Security Management;
  • Inclusion of Site and Supply Chain Security Management as an agenda item within the Management Review Process.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Verification requirements in relation to their items.

You may wish to visit the Verification Activities section of haccp.com for examples of best practice applications for this food safety and quality system element.

Site and Supply Chain Security Management Verification Key Points

  • Your verification program provides evidence that your FS&Q Controls have worked;
  • Site and Supply Chain Security Management programs must be verified to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • The verification of Site and Supply Chain Security Management must be facilitated as per relevant documented Policies, Procedures, and Work Instructions;
  • Nominated verification records for Site and Supply Chain Security Management must be maintained as per relevant documented Policies, Procedures, and Work Instructions;
  • A properly verified Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly verified Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

To confirm the documented monitoring or procedural limits.

Validation

Validation: The process of gathering evidence to provide a scientific basis for the documented act of demonstrating that a procedure, process, and activity will consistently lead to the expected results. It often includes the qualification of systems and equipment.

Validation is the provision of evidence to support the limits of control or acceptability for food safety or quality parameters nominated within systemic elements. Limits of control or acceptability are commonly included within documented food safety and quality systems elements such as procedures, HACCP plans, and specifications.
Common sources of validation include regulatory and legislative standards, finished product specifications and customer requirements, industry codes of practice and guidelines, verified and validated research, historical product, and process control outcomes, and analytical testing.

The general goal of an established verification process is to ensure any systemic non-conformance issues are identified and rectified within an appropriate time frame. When non-conformance issues are identified through the verification process, Corrective Actions and Preventative Actions should be implemented to ensure they do not impact the effectiveness of the food safety and quality system.

Validation activities are commonly defined within the verification schedules and procedures of established food safety and quality management systems.

The following examples may be applicable to the validation of the limits of control or acceptability for Site and Supply Chain Security Management:

  • Confirmation of nominated food safety and food quality control limits for Site and Supply Chain Security Management. These limits may be applicable to regulatory, industry, customer, or finished product specifications;
  • Confirmation of analytical testing methods being used to confirm the effectiveness of Site and Supply Chain Security Management and ensure the accuracy of outcomes.

Conducting Mock Site and Supply Chain Security Drills

Mock Site and Supply Chain Security Drills security drills should be scheduled, conducted, recorded, and reviewed on an ongoing basis to ensure the effectiveness of related procedures and protocols. The outcomes of such activities should be used to apply changes where non-conformance issues or opportunities for improvements are identified.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Validation requirements in relation to their items.

You may wish to visit the Validation Activities section of haccp.com for examples of best practice applications for this food safety and quality system element.

Example of adding more content

  • Content
  • May be added here

Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish.

Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish. Or this can be text based descriptive content if you wish.

Site and Supply Chain Security Management Validation Key Points

  • Your validation program provides evidence that your FS&Q Controls will work;
  • Site and Supply Chain Security Management programs must be validated to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • The validation of Site and Supply Chain Security Management must be facilitated as per relevant documented Policies, Procedures, and Work Instructions;
  • Nominated validation records and supporting documentation for Site and Supply Chain Security Management must be maintained as per relevant documented Policies, Procedures, and Work Instructions;
  • A properly validated Site and Supply Chain Security Management program will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • A poorly validated Site and Supply Chain Security Management program will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

Additional Content Section

  • Addition details
  • May be added
  • In this fashion

Skills, knowledge and competency requirements to facilitate development, documentation, implementation, monitoring, corrective action, verification and validation of every Food Safety and Quality System Element.

Skills and Knowledge

Skills and Knowledge: Skills and knowledge are attributes of human interactions commonly linked to competency within any specific job-related task.

Training and competency requirements for Site and Supply Chain Security Management must be ongoing, including regular scheduled reviews to ensure the effectiveness of training and competency outcomes.

Team members who have defined responsibilities regarding Site and Supply Chain Security Management should have knowledge including:

  • Basic Site and Supply Chain Security Management requirements;
  • Positive outcomes of Site and Supply Chain Security Management;
  • Negative outcomes of a lack of Site and Supply Chain Security Management;
  • Current Site and Supply Chain Security Management procedures, methods, and techniques;
  • General operational, corporate, and social awareness regarding Site and Supply Chain Security Management;
  • Regulatory, industry, and customer requirements regarding Site and Supply Chain Security Management.

Team members who have defined responsibilities regarding Site and Supply Chain Security Management should have skills including:

  • Competency regarding basic Site and Supply Chain Security Management;
  • Effective application of current Site and Supply Chain Security Management procedures, methods, and techniques;
  • The basic development, documentation, and implementation of HACCP and Prerequisite Programs within the food industry sector.

Team members who have defined responsibilities regarding Site and Supply Chain Security Management should have access to resources including:

  • Site and Supply Chain Security Management training;
  • Site and Supply Chain Security Management associations and events;
  • Regulatory standards, industry and customer information and updates regarding Site and Supply Chain Security Management;
  • Incidents within the food industry sector regarding Site and Supply Chain Security Management;
  • Commitment to Site and Supply Chain Security Management by senior management;
  • Suitably qualified food industry professionals with verified experience in Site and Supply Chain Security Management;
  • Effective communication systems including email, internet, and phone through which Site and Supply Chain Security Management information can be sent and received within suitable timeframes.

If your food business supplies foodstuffs manufactured to a customer’s specifications, it is important to consider any specific Site and Supply Chain Security Management Training, Competency, and Resources requirements in relation to their items.

You may wish to visit the Training, Competency, and Resources section of haccp.com for examples of best practice applications for this food safety and quality system element.

Site And Supply Chain Security Management Training, Skills and Knowledge Key Points

  • Your Training, Skills, and Knowledge program ensures all participating personnel, visitors, and contracted have the required skills and knowledge to effectively facilitate the requirements of your FS&Q Program;
  • Training, Skills and Knowledge programs for Site and Supply Chain Security Management must be facilitated to meet relevant Regulatory, Industry, and Customer standards and requirements;
  • Training, Skills and Knowledge programs for Site and Supply Chain Security Management must be facilitated as per relevant documented Policies, Procedures, and Work Instructions;
  • Training, Skills and Knowledge records for Site and Supply Chain Security Management must be maintained as per relevant documented Policies, Procedures, and Work Instructions;
  • Properly applied Training, Skills, and Knowledge programs for Site and Supply Chain Security Management will provide a strong framework for your business to maintain compliance with relevant Regulatory, Industry, and Customer standards and requirements;
  • Poorly applied Training, Skills, and Knowledge programs for Site and Supply Chain Security Management will not fully support your business and may contribute to significant non-compliance against Regulatory, Industry, and Customer standards and requirements.

Share this:

Facebook
Twitter
X
Email