The food industry considers the safety of its products as its main concern. Over the years, industry and regulators have developed food safety management systems, making major outbreaks of food poisoning now quite unusual in many countries.
Hazard Analysis
These systems typically use Hazard Analysis Critical Control Point (HACCP) principles, which are accepted globally. HACCP has proven to be effective against accidental contamination.
However, HACCP principles have not been routinely used to detect or mitigate deliberate, fraudulent actions on a system or process. These actions include the deliberate contamination of food, or food fraud.
This document
Though food fraud commonly encompasses a wide range of deliberate fraudulent acts, this document focuses on one type of food fraud – the intentional and economically motivated adulteration of foods.
The Economically Motivated Adulteration (EMA) pertains to any or all of the following for the economic gain of the seller:
The table below lists the contents of this document.
The table below lists the topics in this section.
Topic |
---|
EMA Types and Food Safety Management |
Food Fraud Prevention: Introduction |
Food Fraud Management System: Process |
Vulnerability and Self-Assessment |
Mitigation Measures |
The types of EMA include the following:
This document does not address the following types of food fraud:
The image below is a pictorial representation of the food safety management system.
Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.
While it is not the intention of food fraud to harm consumers, such acts can cause illness and even death.
This was the case in 2008 when melamine was used as a nitrogen source to fraudulently increase the measured protein content of milk, resulting in more than 50,000 babies being hospitalized and six deaths after having consumed contaminated infant formula.
The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster).
The implications of EMA deprive the consumers of the following:
The prevention of food fraud is paramount to
A food fraud management system is a continuous process as depicted in the flowchart below (from U.S. Pharmacopeia Appendix XVII: Food Fraud Mitigation Guidance).
The table below depicts the stages of food fraud management.
Stage |
Description |
||||||
---|---|---|---|---|---|---|---|
1 |
|
||||||
2 |
Drafting the mitigation strategy. |
||||||
3 |
Review of the mitigation strategy.
|
||||||
4 |
Implementation of the mitigation strategy. |
Note: Periodically or when changes occur that may impact the previously identified vulnerabilities, carry out the entire process again to ensure its continued effectiveness.
Example: A newly identified adulterant for an ingredient that changes the supply chain for an ingredient.
The table below describes the steps in preventing food fraud.
Step |
Action |
---|---|
1 |
Conduct vulnerability assessment that includes knowing your
|
2 |
Reference: For more information about mitigation measures, refer to Mitigation Measures . |
3 |
Validate and verify mitigation measures. |
4 |
Review food fraud management system continually. |
The three aspects of vulnerability assessment are dependent on the following factors driving vulnerabilities:
The factors inherent to the ingredient that are entirely independent of the actions taken by the buyer to mitigate the risk of fraud are the following:
Certain ingredients are by nature more vulnerable to adulteration.
Example: Apple juices or apple purees are more vulnerable than apple pieces.
Fraud history (past cases of adulteration of specific raw materials) is a good source of information which is an indicator of the following:
Factors that may contribute to an increased level of vulnerability to fraud are one or all of the following:
This image depicts a situation of possible food fraud where the price of a valuable food is too good to be true.
This reflects the strength, or the weakness of a company’s mitigation strategy such as
Assessing the risk of fraud for a food ingredient requires the understanding of the following:
This understanding helps define what preventive actions are needed and where, to mitigate adulteration risks.
Note: Such vulnerability assessment is not a one-time activity but a dynamic process, which needs to be maintained with regards to new information and external pressures such as economic anomalies and bad harvest year.
The image below shows adequate vulnerability assessments help in mitigating food fraud.
Recent food fraud crises have highlighted the need to reinforce companies’ ability to combat fraud within their own organization, and across the entire food value chain. Companies are expected to work proactively towards mitigating the risk of food fraud.
Guidance and Self-assessment Tools
A number of organizations have developed guidance and self-assessment tools to help food companies undertake their own vulnerability assessments and implement appropriate control plans.
Examples: US Pharmacopeia, SSAFE, BRC
Reference: For more information about guidance and self-assessment tools, refer to Useful Resources and Tools .
The following are the measures in mitigating food fraud:
To prevent food fraud, have adequate raw material specifications that include the following:
Note: When you need to measure a specific parameter to control the raw material authenticity, focus on using analytical methods that fit the purpose (i.e., adapted for natural viability in the raw material).
Perform the following to be able to plan the analytical surveillance:
Establish a surveillance plan that allows to
Monitor raw materials using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient.
There are two approaches:
The table below lists the topics in this section.
Topic |
---|
Trusted Supplier Relationship |
Trusted Supplier: Types |
Supplier Audit: Example (BRC Issue 7, 2015) |
Supply Chain Transparency and Simplification |
Alert System |
To build a trusted supplier relationship, have processes to approve the suppliers’ production sites, with requirements for approval based on risk
Examples: Raw material risk, location of food safety control measures, and supplier performance.
Once suppliers are qualified according to a robust approval process, the relationship between buyer and supplier is critical to support any adulteration prevention effort.
The development of trusted suppliers (rather than continuous rotation) has the following benefits in mitigating the risk of food fraud.
While building a trusted supplier relationship, ask yourself the following questions:
Question to ask |
Example(s) |
---|---|
How well do you know your suppliers? |
|
How can you learn more about them? |
Partnerships supplier schemes |
The various supplier types could be as follows based on the business relationship you one shares with them:
The long-standing partnership type arrangement entails the following:
The trusted supplier arrangement is similar to the “long-standing partnership-type arrangement”, except the buyer only recently began purchasing a particular ingredient from the supplier.
A high degree of confidence gets established through the purchase of other ingredients.
The established supplier type of relationship with some relationship represents that of a short history of business with the supplier, who is well respected in their market with a solid reputation, and no significant issues reported.
The established supplier type of relationship with no relationship entails a supplier who is respected in their market with a solid reputation, but a business relationship and history have not yet been established.
The unestablished supplier may be new to a given industry. They are often people with whom the buyer has no history or any general industry knowledge of the supplier.
The image below is a representation of purchase records and traceability of raw material usage in a product.
In response to food fraud issues reported in the recent years, a number of requirements have been added to food safety schemes to minimize the risk of operating sites purchasing fraudulent or adulterated raw materials.
The guidelines of supplier audit conducted in 2015 are the following:
Processes were established to access information about past and current threats to the supply chain. These threats were likely to present a risk of adulteration or substitution of raw materials. Such information was obtained from
Documented vulnerability assessment was carried out on all food raw materials or groups of raw materials to assess the potential risk of adulteration or substitution. The following were considered during this assessment:
The vulnerability assessment was reviewed annually to understand the following factors that could alter the potential risk:
Where raw materials were identified as being at risk of adulteration or substitution, appropriate assurance and/ or testing processes were put in place to reduce the risk (e.g., auditor to review the historical test results of materials identified at risk of adulteration).
Absence of Scheme-specific Requirement
The site undertook documented mass balance tests (for example: every 6 months in the absence of a scheme-specific requirement).
The status of each batch of the raw material was verified when
Methods of Production
Where claims were made about the methods of production (for example: organic, Halal, Kosher), the site maintained the necessary certification status to make such a claim.
The auditors were able to do the following during their inspection:
A streamlined upstream supply chain has the following benefits:
The first step towards supply chain transparency is to ask yourself the following questions first:
The table below describes the steps in simplifying the supply chain.
Step |
Action |
---|---|
1 |
Map your supply chain. |
2 |
|
3 |
Simplify your supply chain. Note: Simplifying the supply chain helps eliminate sources of risk to a great extent. |
The image below depicts transparency in the supply chain as a means to eliminate the sources of risk.
Maintaining a routine watch of official and industry publications does one or all of the following:
The table below lists the topics in this section.
The table below provides the full forms of the abbreviated terms used within this document.
Term |
Full Form |
---|---|
BRC |
British Retail Consortium |
EMA |
Economically Motivated Adulteration |
GMO |
Genetically Modified Organism |
HACCP |
Hazard Analysis Critical Control Point |
SCS |
Supply Chain Security |
The table below provides the definitions of the terms used within this document.
Term |
Definition |
---|---|
Buyer |
The party that is buying materials (raw or semi-finished), food ingredients or food products from suppliers |
Economically motivated adulteration (EMA) |
The intentional adulteration of foods, motivated by economic gain. It is the type of fraud covered in this document |
Food operator |
Organisation carrying out any of the activities related to the following:
|
Mitigation measure |
Measure taken to decrease vulnerability to a certain type of adulteration in a given supply chain |
Mitigation strategy |
Selected set of mitigation measures aimed at preventing food fraud in a given supply chain |
Supplier |
The party that is supplying materials (raw or semi-finished), food ingredients or food products to other parties (e.g., food operators) in the value chain |
Vulnerability assessment (or vulnerability characterization) |
Within a food fraud management system, the step aimed at reviewing and assessing various factors, which create vulnerabilities in a supply chain (i.e. weak points where fraud has greater chances to occur) |
The table below answers the frequently asked questions about adulteration.
Topic |
Question |
Answer |
---|---|---|
EMA |
What is economically motivated adulteration (EMA)? |
|
Is EMA the same as “food fraud”? |
|
|
Is EMA the same as contamination? |
|
|
EMA and food items |
What foods are affected by EMA? |
|
EMA and health |
Does EMA cause harm to health? |
|
EMA and humans and pets |
Does EMA only affect humans? What about pets? |
In 2007, an EMA incident involving adulterated wheat gluten used in pet food caused thousands of dogs and cats in the USA to suffer illnesses and death. |
EMA and regulatory agencies |
Are government regulatory agencies concerned about EMA? |
|
Detection of adulterated material |
What should I do when I detect an adulterated material? |
Follow the guidelines below when you detect an adulterated material:
Report the case to competent authorities. |
Identification of a new adulteration risk |
What should I do when I identify a new adulteration risk? |
Follow the guidelines below when you identify a new adulteration risk:
Continue to monitor this risk (e.g. through analytical surveillance plans) to ensure that your mitigation measures are effective to prevent occurrence of this issue in your supply chain. |
The table below answers the questions about food fraud.
Topic |
Question |
Answer |
---|---|---|
Nestle and food fraud prevention |
What is Nestlé doing to prevent food fraud? |
|
Food fraud and operators and suppliers |
What should food operators and suppliers do about food fraud? |
To prevent food fraud and better ensure food safety and consumer protection, the food operators, their suppliers and all partners along the food value chain (including industry associations and authorities) need to follow the guidelines below:
|
Consumers and food fraud |
What should consumers know about food fraud when purchasing food? |
|
The list below provides hyperlinks to the following guidance documents:
The list below provides hyperlinks to the following self-assessment tools:
The list below provides hyperlinks to the following alerts and databases:
The list below provides hyperlinks to the following standards:
The table below provides the specifications of supply chain security with their specification codes.
Specification Code |
Specification |
---|---|
BS ISO 28000 |
Specification for security management systems for the supply chain |
BS ISO 28002 |
|
PD CEN/TR 16412 |
|
The list below provides hyperlinks to the following sources of information:
The list below provides hyperlinks to material for further reading.