Mitigation Strategies to Protect Food Against Intentional Adulteration: Guidance for Industry

Total Page:16

File Type:pdf, Size:1020Kb

Mitigation Strategies to Protect Food Against Intentional Adulteration: Guidance for Industry Contains Nonbinding Recommendations Draft-Not for Implementation Mitigation Strategies to Protect Food Against Intentional Adulteration: Guidance for Industry Revised Draft Guidance This guidance is being distributed for comment purposes only. Although you can comment on any guidance at any time (see 21 CFR 10.115(g)(5)), to ensure that FDA considers your comment on this draft guidance before we begin work on the final version of the guidance, submit either electronic or written comments on the draft guidance within 120 days of publication in the Federal Register of the notice announcing the availability of the draft guidance. Submit electronic comments to https://www.regulations.gov. Submit written comments to the Dockets Management Staff (HFA-305), Food and Drug Administration, 5630 Fishers Lane, rm. 1061, Rockville, MD 20852. All comments should be identified with the docket number FDA-2018-D-1398 listed in the notice of availability that publishes in the Federal Register. For questions regarding this draft document contact the Center for Food Safety and Applied Nutrition (CFSAN) at 240-402-3712. U.S. Department of Health and Human Services Food and Drug Administration Center for Food Safety and Applied Nutrition March 2019 Contains Nonbinding Recommendations Draft-Not for Implementation Table of Contents I. Introduction............................................................................................................................ 7 II. Purpose of this Guidance.................................................................................................. 9 III. Glossary of Terms Used in This Guidance ................................................................... 10 A. Definitions Established in 21 CFR 121 .......................................................................... 10 B. Other Terms Used in this Guidance ............................................................................... 12 C. Table of Abbreviations Used in This Guidance ............................................................. 15 IV. Exemptions ...................................................................................................................... 16 A. Very Small Business ...................................................................................................... 16 B. Holding of Food ............................................................................................................. 16 C. Packing and Labeling ..................................................................................................... 16 D. Farm Activities Covered by Standards for Produce Safety ........................................... 16 E. Alcoholic Beverages ....................................................................................................... 16 F. Animal Food ................................................................................................................... 17 G. Low-Risk Activities at Farm Mixed-Type Facilities ..................................................... 17 Chapter 1: The Food Defense Plan ........................................................................................... 18 A. What is a Food Defense Plan? ....................................................................................... 18 B. Individuals to Assist with Developing Your Facility’s Food Defense Plan ................... 19 C. Formatting a Food Defense Plan .................................................................................... 20 D. Determining When to Make Changes to a Food Defense Plan ...................................... 20 E. Maintaining a Food Defense Plan .................................................................................. 21 Chapter 2: Vulnerability Assessment to Identify Significant Vulnerabilities and Actionable Process Steps................................................................................................................................ 22 2 Contains Nonbinding Recommendations Draft-Not for Implementation A. What is a Vulnerability Assessment? ............................................................................. 22 B. Recommended Activities Prior to Conducting a Vulnerability Assessment .................. 23 C. Key Activity Types as an Appropriate Method for Conducting a Vulnerability Assessment to Identify Significant Vulnerabilities and Actionable Process Steps ............... 25 D. Key Activity Type Descriptions ..................................................................................... 26 E. Identifying Actionable Process Steps Using the Key Activity Types Method ............... 28 F. Evaluating the Three Fundamental Elements [New March 2019] ................................. 36 1. Considerations in Evaluating the Three Fundamental Elements ............................... 37 2. Potential Public Health Impact (Element 1) ............................................................... 40 3. Degree of Physical Access to the Product (Element 2) .............................................. 52 4. Ability of Attacker to Successfully Contaminate the Product (Element 3) ............... 54 G. Identifying Significant Vulnerabilities and Actionable Process Steps Using the Three Fundamental Elements [New March 2019] ................................................................. 58 1. Using the Scores from the Three Fundamental Elements to Identify Significant Vulnerabilities and Actionable Process Steps ................................................ 59 2. Written Explanation for Identification of Actionable Process Steps ......................... 64 H. Identifying Actionable Process Steps Using the Hybrid Approach: Combining the Key Activity Types and the Three Fundamental Elements [New March 2019] ................... 65 Chapter 3: Mitigation Strategies for Actionable Process Steps .............................................. 67 A. Mitigation Strategies Requirement ................................................................................ 67 B. Identifying Mitigation Strategies .................................................................................... 68 1. Minimizing the Accessibility of the Product to an Inside Attacker ........................... 69 2. Reducing the Ability of an Inside Attacker to Contaminate the Product ................... 73 C. Using Multiple Mitigation Strategies ............................................................................. 75 D. Facility-wide Security Measures and Their Role in a Facility’s Food Defense System.................................................................................................................................... 76 3 Contains Nonbinding Recommendations Draft-Not for Implementation E. The Role of Existing Measures ...................................................................................... 77 F. Accompanying Explanation for Mitigation Strategies in the Food Defense Plan .......... 79 G. Mitigation Strategy Example Scenarios ......................................................................... 80 1. Scenario 1 ................................................................................................................... 80 2. Scenario 2 ................................................................................................................... 81 3. Scenario 3 ................................................................................................................... 81 4. Scenario 4 ................................................................................................................... 82 Chapter 4: Mitigation Strategies Management Components: Food Defense Monitoring ... 89 A. Overview of Food Defense Monitoring ......................................................................... 89 B. How Food Defense Monitoring Differs from Food Safety Monitoring ......................... 89 C. What to Monitor ............................................................................................................. 90 D. How to Monitor .............................................................................................................. 91 1. How Often to Monitor (Frequency of Monitoring) .................................................... 91 2. Who Performs the Monitoring ................................................................................... 93 E. Food Defense Monitoring Records................................................................................. 93 F. Exception Records .......................................................................................................... 94 Chapter 5: Mitigation Strategies Management Components: Food Defense Corrective Actions (coming soon) ............................................................................................................... 103 Chapter 6: Mitigation Strategies Management Components: Food Defense Verification (coming soon) ............................................................................................................................. 104 Chapter 7: Reanalysis (coming soon) ...................................................................................... 105 Chapter 8: Education, Training, or Experience [New March 2019] ................................... 106 A. Individuals Who Perform Activities Required by Subpart C ....................................... 106 B. Individuals Assigned to an Actionable Process Step ................................................... 107 4 Contains
Recommended publications
  • Man'yogana.Pdf (574.0Kb)
    Bulletin of the School of Oriental and African Studies http://journals.cambridge.org/BSO Additional services for Bulletin of the School of Oriental and African Studies: Email alerts: Click here Subscriptions: Click here Commercial reprints: Click here Terms of use : Click here The origin of man'yogana John R. BENTLEY Bulletin of the School of Oriental and African Studies / Volume 64 / Issue 01 / February 2001, pp 59 ­ 73 DOI: 10.1017/S0041977X01000040, Published online: 18 April 2001 Link to this article: http://journals.cambridge.org/abstract_S0041977X01000040 How to cite this article: John R. BENTLEY (2001). The origin of man'yogana. Bulletin of the School of Oriental and African Studies, 64, pp 59­73 doi:10.1017/S0041977X01000040 Request Permissions : Click here Downloaded from http://journals.cambridge.org/BSO, IP address: 131.156.159.213 on 05 Mar 2013 The origin of man'yo:gana1 . Northern Illinois University 1. Introduction2 The origin of man'yo:gana, the phonetic writing system used by the Japanese who originally had no script, is shrouded in mystery and myth. There is even a tradition that prior to the importation of Chinese script, the Japanese had a native script of their own, known as jindai moji ( , age of the gods script). Christopher Seeley (1991: 3) suggests that by the late thirteenth century, Shoku nihongi, a compilation of various earlier commentaries on Nihon shoki (Japan's first official historical record, 720 ..), circulated the idea that Yamato3 had written script from the age of the gods, a mythical period when the deity Susanoo was believed by the Japanese court to have composed Japan's first poem, and the Sun goddess declared her son would rule the land below.
    [Show full text]
  • ALTEC Language Class: Japanese Beginning II
    ALTEC Language Class: Japanese Beginning II Class duration: 10 weeks, January 28–April 7, 2020 (no class March 24) Class meetings: Tuesdays at 5:30pm–7:30pm in Hellems 145 Instructor: Megan Husby, [email protected] Class session Resources before coming to Practice exercises after Communicative goals Grammar Vocabulary & topic class class Talking about things that you Verb Conjugation: Past tense Review of Hiragana Intro and あ column Fun Hiragana app for did in the past of long (polite) forms Japanese your Phone (~desu and ~masu verbs) Writing Hiragana か column Talking about your winter System: Hiragana song break Hiragana Hiragana さ column (Recognition) Hiragana Practice クリスマス・ハヌカー・お Hiragana た column Worksheet しょうがつ 正月はなにをしましたか。 Winter Sports どこにいきましたか。 Hiragana な column Grammar Review なにをたべましたか。 New Year’s (Listening) プレゼントをかいましたか/ Vocab Hiragana は column もらいましたか。 Genki I pg. 110 スポーツをしましたか。 Hiragana ま column だれにあいましたか。 Practice Quiz Week 1, えいがをみましたか。 Hiragana や column Jan. 28 ほんをよみましたか。 Omake (bonus): Kasajizō: うたをききましたか/ Hiragana ら column A Folk Tale うたいましたか。 Hiragana わ column Particle と Genki: An Integrated Course in Japanese New Year (Greetings, Elementary Japanese pgs. 24-31 Activities, Foods, Zodiac) (“Japanese Writing System”) Particle と Past Tense of desu (Affirmative) Past Tense of desu (Negative) Past Tense of Verbs Discussing family, pets, objects, Verbs for being (aru and iru) Review of Katakana Intro and ア column Katakana Practice possessions, etc. Japanese Worksheet Counters for people, animals, Writing Katakana カ column etc. System: Genki I pgs. 107-108 Katakana Katakana サ column (Recognition) Practice Quiz Katakana タ column Counters Katakana ナ column Furniture and common Katakana ハ column household items Katakana マ column Katakana ヤ column Katakana ラ column Week 2, Feb.
    [Show full text]
  • Writing As Aesthetic in Modern and Contemporary Japanese-Language Literature
    At the Intersection of Script and Literature: Writing as Aesthetic in Modern and Contemporary Japanese-language Literature Christopher J Lowy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2021 Reading Committee: Edward Mack, Chair Davinder Bhowmik Zev Handel Jeffrey Todd Knight Program Authorized to Offer Degree: Asian Languages and Literature ©Copyright 2021 Christopher J Lowy University of Washington Abstract At the Intersection of Script and Literature: Writing as Aesthetic in Modern and Contemporary Japanese-language Literature Christopher J Lowy Chair of the Supervisory Committee: Edward Mack Department of Asian Languages and Literature This dissertation examines the dynamic relationship between written language and literary fiction in modern and contemporary Japanese-language literature. I analyze how script and narration come together to function as a site of expression, and how they connect to questions of visuality, textuality, and materiality. Informed by work from the field of textual humanities, my project brings together new philological approaches to visual aspects of text in literature written in the Japanese script. Because research in English on the visual textuality of Japanese-language literature is scant, my work serves as a fundamental first-step in creating a new area of critical interest by establishing key terms and a general theoretical framework from which to approach the topic. Chapter One establishes the scope of my project and the vocabulary necessary for an analysis of script relative to narrative content; Chapter Two looks at one author’s relationship with written language; and Chapters Three and Four apply the concepts explored in Chapter One to a variety of modern and contemporary literary texts where script plays a central role.
    [Show full text]
  • AIX Globalization
    AIX Version 7.1 AIX globalization IBM Note Before using this information and the product it supports, read the information in “Notices” on page 233 . This edition applies to AIX Version 7.1 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2010, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in AIX................................................................................................................................vii ISO 9000.....................................................................................................................................................vii AIX globalization...................................................................................................1 What's new...................................................................................................................................................1 Separation of messages from programs..................................................................................................... 1 Conversion between code sets.............................................................................................................
    [Show full text]
  • Food Defense Fact Sheet
    Food Defense Fact Sheet What is Food Defense? Food defense is the protection of food products from intentional contamination or adulteration where there is an intent to cause public health harm and/or economic disruption. Highlighted Food Defense Tools and Resources Food Defense 101 provides training in preparedness against an intentional attack against our food supply. The courses provide an understanding of and guidance for developing a Food Defense Plan(s) based on a common sense approach. http://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm353774.htm Employees FIRST is an initiative that food industry managers can include in their ongoing employee food defense training programs. Employees FIRST educates front-line food industry workers from farm to table about the risk of intentional food contamination and the actions they can take to identify and reduce these risks. http://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm295997.htm FDA Food Defense Plan Builder is a user-friendly software program designed to assist owners and operators of food facilities with developing personalized food defense plans for their facilities. This user-friendly tool harnesses existing FDA tools, guidance, and resources for food defense into one single application. The Food Defense Plan Builder guides the user through the following sections: Company Information; Broad Mitigation Strategies; Vulnerability Assessment; Focused Mitigation Strategies; Emergency Contacts; Action Plan; and Supporting Documents. http://www.accessdata.fda.gov/scripts/fdplanbuilder/ Food Related Emergency Exercise Bundle (FREE-B) is a compilation of scenarios based on both intentional and unintentional food contamination events. It is designed with the intention of assisting government regulatory and public health agencies in assessing existing food emergency response plans, protocols and procedures that may be in place, or that they are in the process of revising or even developing.
    [Show full text]
  • Introduction to the Special Issue on Japanese Geminate Obstruents
    J East Asian Linguist (2013) 22:303-306 DOI 10.1007/s10831-013-9109-z Introduction to the special issue on Japanese geminate obstruents Haruo Kubozono Received: 8 January 2013 / Accepted: 22 January 2013 / Published online: 6 July 2013 © Springer Science+Business Media Dordrecht 2013 Geminate obstruents (GOs) and so-called unaccented words are the two properties most characteristic of Japanese phonology and the two features that are most difficult to learn for foreign learners of Japanese, regardless of their native language. This special issue deals with the first of these features, discussing what makes GOs so difficult to master, what is so special about them, and what makes the research thereon so interesting. GOs are one of the two types of geminate consonant in Japanese1 which roughly corresponds to what is called ‘sokuon’ (促音). ‘Sokon’ is defined as a ‘one-mora- long silence’ (Sanseido Daijirin Dictionary), often symbolized as /Q/ in Japanese linguistics, and is transcribed with a small letter corresponding to /tu/ (っ or ッ)in Japanese orthography. Its presence or absence is distinctive in Japanese phonology as exemplified by many pairs of words, including the following (dots /. / indicate syllable boundaries). (1) sa.ki ‘point’ vs. sak.ki ‘a short time ago’ ka.ko ‘past’ vs. kak.ko ‘paranthesis’ ba.gu ‘bug (in computer)’ vs. bag.gu ‘bag’ ka.ta ‘type’ vs. kat.ta ‘bought (past tense of ‘buy’)’ to.sa ‘Tosa (place name)’ vs. tos.sa ‘in an instant’ More importantly, ‘sokuon’ is an important characteristic of Japanese speech rhythm known as mora-timing. It is one of the four elements that can form a mora 1 The other type of geminate consonant is geminate nasals, which phonologically consist of a coda nasal and the nasal onset of the following syllable, e.g., /am.
    [Show full text]
  • The Need for Food Defense in the Post-9/11 Era Can the Risk Be Ignored? Many People Are Familiar with “Food Safety.” It Has Been Likely to Occur in the Food Supply
    The need for food defense in the post-9/11 era Can the risk be ignored? Many people are familiar with “food safety.” It has been likely to occur in the food supply. recognized for many years as being essential for businesses The key words are obviously “unintentional” for food that supply food products anywhere in the supply chain. safety and “intentional” for food defense. The food The term “food defense,” however, is another issue. industry has the personnel and infrastructure in place for food safety, but many in the industry are struggling with Shortly after the tragic events of September 11, 2001, how to approach food defense. the U.S. government became concerned that terrorist organizations might seek to contaminate parts of the Long before 2001, there was documentation of intentional American food supply. In December 2001, the Food food contamination incidents throughout the world. A and Drug Administration (FDA) and the United States study by the Centre of Excellence for National Security Department of Agriculture (USDA) began a dialogue with (CENS) in Singapore, written by G.R. Dalzeil, reported that a number of security professionals in the food industry between 1950 and 2008, there were approximately 398 to determine the current state of readiness against an confirmed incidents of contamination and approximately intentional attack. The information gathered was not 125 unconfirmed incidents. The information for this study encouraging. Prior to 2001, security departments in the was gathered worldwide; however, 42 percent of the food industry were mostly concerned with protecting incidents occurred in the U.S.; the U.S., UK, and Australia people and assets.
    [Show full text]
  • Food Defense Survey & Report
    Food Defense Survey & Report Food Defense Prepared by Catherine L. Feinman Foreword by Amy Kircher December 2013 © Copyright 2013, by IMR Group, Inc. publishers of DomesticPreparedness.com, the DPJ Weekly Brief, and the DomPrep Journal; reproduction of any part of this publication without express written permission is strictly prohibited. IMR Group Inc., 517 Benfield Road, Suite 303, Severna Park, MD 21146, USA; phone: 410-518-6900; email: [email protected]; also available at www.DomPrep.com ~ This page was left blank intentionally ~ ACKNOWLEDGEMENTS Food, like water and air, is essential to sustain life. For the past three years, DomPrep has focused on protecting the food supply in one manner or another. Each time we achieved better results. Early this year, in a conversation with Scott Becker, executive director at the Association of Public Health Laboratories, he remarked, “If you really want to learn about food preparedness, you must go to the University of Minnesota.” He was right. This report is the result of an Insiders Roundtable held at that prestigious venue. Thank you Scott, for your important suggestion. Additionally, DomPrep’s staff Susan Collins and Catherine Feinman did a terrific job in producing this report. Catherine researched, compiled, drafted, analyzed, and edited a huge amount of content into the final product. Susan coordinated and organized the design, layout, and production. A special thank you goes to them. Select advisors from the DomPrep40 provided thought leadership, insight, and professional contacts to increase the report’s importance, credibility, and relevance to planners and policy professionals alike. A warm thank you goes to Amy Kircher, DrPH, director of the National Center for Food Protection and Defense at the University of Minnesota, Maureen Sullivan, emergency preparedness and response laboratory coordinator of the Minnesota Department of Health, and Craig W.
    [Show full text]
  • Implementing Cross-Locale CJKV Code Conversion
    Implementing Cross-locale CJKV Code Conversion Ken Lunde, Adobe Systems Incorporated [email protected] http://www.oreilly.com/~lunde/ 1. Introduction Most operating systems today deal with single locales. Within a single CJKV locale, different operating sys- tems often use different encodings for the same character set. Consider Shift-JIS and EUC-JP encodings for Japanese—Shift-JIS is historically used on MacOS and Windows, but EUC-JP is used on Unix. This makes code conversion a necessity. Code conversion within a single locale is, by and large, a trivial operation that typically involves a mathematical algorithm. In the past, a lot of code conversion was performed by users through dedicated software tools. Many of today’s applications include built-in code conversion routines, but these routines deal with only multiple encodings of a single locale (such as EUC-KR, ISO-2022-KR, Johab, and Unified hangul Code encodings for Korean). Code conversion across CJKV locales, such as between Chinese and Japanese, is more problematic. While Unicode serves as an excellent basis for implementing cross-locale code conversion, there are still problems to be addressed, such as unmappable characters. 2. Code Conversion Basics Converting between different encodings of a single locale, which represents a trivial effort that involves well- established code conversion algorithms (or mapping tables), is a well-understood process these days. How- ever, as soon as code conversion extends beyond a single locale, there are additional complexities that arise, such as the following: • Code conversion algorithms almost always must be replaced by mapping tables because the ordering of characters in different CJKV character sets are different.
    [Show full text]
  • Table of Hiragana Letters Pdf
    Table of hiragana letters pdf Continue Hiragana is one of three sets of characters used in Japanese. Each letter of Hiragana is a special syllable. The letter itself doesn't make sense. Hiragan is widely used to form a sentence. You can download/print the Hiragan chart (PDF) of all Hiragana's letters. The origin of Hiragan あ か た ま や the original 安 加 太 末 也 of Hiragan was developed in the 8th-10th century by simplifying the shape of specific kanji symbols. Compared to Katakana, Hiragana's letters have more curved lines. Number of letters In modern Japanese 46 basic letters of Hiragana. In addition to these 46 main letters, called gojon, there are modified forms to describe more time - 20 dakun, 5 handakuon, 36 y'on, 1 sokuon and 6 additional letters. Frequently asked questions: What are the letters with the bar on top ( Yap.) ? Gojaon 【五⼗⾳】 Goyon-【五⼗⾳図】 In Japanese, syllables are organized as a table (5 x 10). This table is called goj'on-zu (literally means a table of 50 sounds). The alphabets of Hiragan and Katakana are used to describe these sounds. Letters い, う and え appear more than once in the table. These 5 duplicates (grey) are usually missed or ignored. It includes ん syllable. It does not belong to any row or column. In total, 46 letters (45'1) are considered goj'on (50 sounds). You can learn the goj'on letters on the Hiragan course: Part 1-10. The structure of table First row - あ, い, う, え and お - five vowels of Japanese.
    [Show full text]
  • Sveučilište Josipa Jurja Strossmayera U Osijeku Filozofski Fakultet U Osijeku Odsjek Za Engleski Jezik I Književnost Uroš Ba
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Croatian Digital Thesis Repository Sveučilište Josipa Jurja Strossmayera u Osijeku Filozofski fakultet u Osijeku Odsjek za engleski jezik i književnost Uroš Barjaktarević Japanese-English Language Contact / Japansko-engleski jezični kontakt Diplomski rad Kolegij: Engleski jezik u kontaktu Mentor: doc. dr. sc. Dubravka Vidaković Erdeljić Osijek, 2015. 1 Summary JAPANESE-ENGLISH LANGUAGE CONTACT The paper examines the language contact between Japanese and English. The first section of the paper defines language contact and the most common contact-induced language phenomena with an emphasis on linguistic borrowing as the dominant contact-induced phenomenon. The classification of linguistic borrowing thereby follows Haugen's distinction between morphemic importation and substitution. The second section of the paper presents the features of the Japanese language in terms of origin, phonology, syntax, morphology, and writing. The third section looks at the history of language contact of the Japanese with the Europeans, starting with the Portuguese and Spaniards, followed by the Dutch, and finally the English. The same section examines three different borrowing routes from English, and contact-induced language phenomena other than linguistic borrowing – bilingualism , code alternation, code-switching, negotiation, and language shift – present in Japanese-English language contact to varying degrees. This section also includes a survey of the motivation and reasons for borrowing from English, as well as the attitudes of native Japanese speakers to these borrowings. The fourth and the central section of the paper looks at the phenomenon of linguistic borrowing, its scope and the various adaptations that occur upon morphemic importation on the phonological, morphological, orthographic, semantic and syntactic levels.
    [Show full text]
  • FOOD DEFENSE Election Outcomes
    FI RST RESP0N DE RS TOO LBOX Complex Operating Environment - Food and Agriculture Food and agriculture infrastructure is a $1 trillion industry, TARGETED INFRASTRUCTURE: Food infrastructure is considered FIRST RESPONDER AND PUBLIC HEALTH RESPONSE PLANNING • Identify medical centers in and around the region and assess almost entirely under private ownership and comprises an a “soft target” for deliberate attack because of the decentralized CONSIDERATIONS: It is highly recommended that frst responders capabilities for food contamination response; estimated 2.1 million farms, 935,000 restaurants, and more nature of the infrastructure nodes. Nodes often provide multiple establish rapport with the appropriate local public health, law • Report unusual illnesses or deaths with quick onset than 200,000 registered food manufacturing, processing, and entry points into the food continuum and have limited to no security. enforcement, and private-sector food supply entities before of symptoms; storage facilities. Intentional contamination of the food supply Examples of nodes with limited security include processing, an incident. Establishing information-sharing relationships • Enhance lab testing (some routine testing does not test for all could have signifcant public health and economic consequences transportation, and distribution mechanisms and facilities, while and participating in preparedness exercises can help ensure potential contaminants, so enhancing testing would need to depending on the commodity, the agent used, and where in the nodes with little or no security might include restaurants, cafeterias, suffcient laboratory capacity, technical capability, and medical be balanced with beneft); and supply chain the contaminant was added. This product provides grocery stores, and food service and storage. countermeasures are in place to address properly a potential • Train for evidence handling (it is important to obtain samples intentional food-contamination attack.
    [Show full text]