• Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Archives for Learn

11th August 2022 by Karen Constable

Food Safety Standards Compared (2022)

 

food vulnerability assessment

 

When it comes to food fraud, each food safety standard has slightly different food fraud requirements. For example, some standards require food businesses to include counterfeiting in their vulnerability assessments, while others don’t; some standards specify that vulnerability assessments must be performed on ingredients, while others state they should be done on finished products.

Confused? We are here to help.  Read on to find out which standards have what requirements, and get recommendations for creating a great food fraud prevention (VACCP) program.

Background

Food safety standards are standards that describe requirements for food and related businesses.  The requirements aim to ensure that food and food-related goods are safe for consumers and customers.  The correct term for such standards is food safety management systems standards (FSMS).

There are food safety standards for all types of operations within the food supply chain, including:

  • growing and packing fresh produce;
  • manufacture of food and food ingredients;
  • buying and selling food (“brokers”);
  • storage and transport of food;
  • manufacture or converting of packaging materials;
  • manufacture of animal feed or pet food;
  • services such as cleaning, laundry, or pest control for food businesses.

The over-arching aim of all food safety standards is to keep consumers safe, but most standards also have secondary aims. Some of the most popular food safety standards were developed by food retailing groups, and these standards were written to protecting the retailers’ brands as well as keeping consumers safe. Other standards were developed to help food businesses understand best practices and gain a way to demonstrate their excellence through independent certifications.  Some standards include quality parameters, while others only address food safety issues.

There are dozens of internationally accepted food safety management system standards, each with slightly different requirements.  This can make it difficult to know which standards are ‘better’ or more suitable for your food company.

To solve this problem, a standard for food safety standards was created by the GFSI (Global Food Safety Initiative).  The GFSI assesses and approves food safety standards using a process called benchmarking. The aim of GFSI benchmarking is to define best practice in food safety standards and provide a way to compare and align different food safety standards.

Among the dozens of food safety standards, some are benchmarked by the GFSI (Global Food Safety Initiative), while others are not.  Benchmarked standards usually have more requirements and more rigorous expectations than non-benchmarked standards.  The auditing and certification processes for benchmarked standards are typically more time-consuming and often more expensive than for non-benchmarked standards.

Food Fraud in Food Safety Standards

Food fraud prevention activities are an important part of all food safety management systems because food fraud can pose a risk to food safety.  Some food safety standards have separate, stand alone requirements for food fraud prevention activities, while others do not.  Standards that are GFSI-benchmarked all include explicit, separate food-fraud-related requirements. Other standards rely on the hazard analysis elements of the food safety system to identify and control hazards from food fraud.

The GFSI requires all benchmarked standards to require food companies to do a vulnerability assessment for food fraud and create a mitigation plan for food fraud prevention.  Most GFSI-benchmarked standards also include details about which materials should be assessed and which types of food fraud need to be managed.

Non-GFSI standards vary in how they require a food company to approach food fraud.  Some specify or recommend a VACCP program, which is based on food fraud vulnerability assessment activities. Others, like AIB, require that food fraud risks be considered in the supplier approvals processes.  The regulations of the USA Food Safety Modernization Act (FSMA) require that food businesses identify hazards from economically motivated adulteration type food fraud and implement preventive controls to minimise the risks.

Among the most well-known standards there are some notable differences. For example, the SQF Food Safety Code requires food businesses to assess and manage risks from counterfeit-type food fraud, while the BRC Food Safety Standard only requires businesses to assess the risks from adulteration or substitution activities. BRC requires horizon scanning activities, while the SQF and IFS standards explicitly mention food fraud training.

Below you will find a table that compares the current food fraud requirements of each of the major food safety standards.

Table 1.  Food fraud requirements of major food safety standards, 2022. 

Click here to open or download a pdf version of this table

  AIB* BRC* FSSC* GlobalGAP* IFS* SQF*
Food types to include in food fraud prevention activities Ingredients (implied)

 

 

Raw materials

 

 

Products and processes

 

 

Unclear

 

 

Raw materials,

ingredients,

packaging,

outsourced processes

Raw materials,

Ingredients,

finished products

 

Food fraud types

 

 

 

Economically motivated adulteration (only)

 

 

Adulteration,

substitution

(only)

 

 

Any type where consumer health is at risk (in definition, Appendix A)

 

Unclear, however counterfeit or non-foodgrade packaging or propagation materials are included as examples

 

Substitution, mislabelling, adulteration, counterfeiting

 

 

Substitution, mislabelling, dilution, counterfeiting

 

 

Vulnerability assessments explicitly required? Risk assessment (implied, Appendix A) Yes Yes Risk assessment Yes Implied (Edition 9)
Mitigation plan required?

 

 

– Mitigation activities are to be included in the vulnerability assessment Yes Yes Yes Yes
Does packaging need to be included in the vulnerability assessment? Yes

(implied)

 

Yes

(see 3.5.1.1)

 

Yes

(as per food fraud definition, Appendix A)

Yes

 

 

Yes

 

 

Implied

(primary packaging is a ‘raw material’)

Is a separate food fraud procedure explicitly required? – – Yes – Implied

(“responsibilities shall be defined”)

Implied

(“methods and responsibilities shall be documented”)

Is training in food fraud explicitly mentioned? – Implied

(Clause 5.4.1)

– – Yes

(Clause 3.3.4)

Yes
Is an annual review explicitly required? – Yes – – Yes Yes
Other

 

 

– Horizon scanning for developing threats must be done (Clause 5.4.1) – – Criteria for vulnerability assessments must be defined

(4.20.2)

Food safety risks from food fraud must be specified (2.7.2.2)

*  The full names of the standards are as follows:

AIB International Consolidated Standards for Inspection of Prerequisite and Food Safety Programs, 2023 (NEW!)

BRCGS Food Safety, Issue 9 (NEW!)

FSSC 22000, Version 5.1

GlobalG.A.P. Integrated Farm Assurance (IFA), Version 5.4-1

IFS Food, Version 7

SQF Food Safety Code, Edition 9

Takeaways

Among the major food safety management system standards, there are small but significant differences between food fraud prevention requirements.  Key differences include whether finished products or ingredients are to be assessed, which types of food fraud must be included and the presence/absence of requirements related to horizon scanning and training.

If that all seems confusing, don’t despair…

Recommendations for a robust and compliant food fraud prevention program (VACCP)

At Food Fraud Advisors we have been working at the intersection of food fraud and food safety since the very beginning!  Creating a robust and compliant food fraud program can take time and effort but it isn’t complicated.  Follow the steps below to get started:

  1. Carefully read the food fraud clauses of the standard you are/will be certified to.
  2. Pay attention to the food types and the food fraud types that are mentioned in your standard. HINT: you may need to check the definitions or glossary.
  3. Create a robust vulnerability assessment (here’s how) and a mitigation plan for identified vulnerabilities.
  4. Whether or not it is explicitly required in your standard, we recommend you create a food fraud prevention procedure that defines the methods, responsibilities and criteria for food fraud prevention.
  5. You should also conduct training for all relevant staff and ensure that the food fraud system is reviewed at least annually.

Get a complete guide to the food fraud requirements of all the major food safety standards from us, the food fraud experts, here.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Consultancy, Food Fraud, Learn, Vulnerability Assessments Tagged With: 2.5.4, 2.7.2, 4.20, 5.4.1, 5.4.2, AF16.1, AF16.2, audit, BRC, BRC Issue 9, economically motivated adulteration, food fraud consultant, food safety standard, GFSI, HACCP, SQF Edition 9

26th June 2022 by foodfraudadvisors

Investigating Susceptibility to Food Fraud

Updated 26th June 2022

Some foods are more susceptible than others to economically motivated adulteration, substitution and dilution.  Understanding the susceptibility of an ingredient or raw material type is an important part of every food fraud vulnerability assessment process.

A TWO PART PROCESS

Susceptibility is investigated in two parts.

(1) General Susceptibility (is this type of food often affected by food fraud or not?)

You can estimate a foods general susceptibility using publicly available information.

(2) Specific Susceptibility (is the food we purchase likely to be affected by food fraud?)

The specific food fraud attributes depend on your supply chain, management of the supply chain and testing and auditing activities.

STEP 1. GENERAL SUSCEPTIBILITY

To investigate the general susceptibility of a food or ingredient to food fraud, use publicly available information about incidences of fraud that have occurred in the past and that might occur in the future.

There are a few different ways to access information about previous incidences and emerging issues with a raw material type, as shown below.

1. Online databases – access to historical data:

A food fraud database provides a way to access historical information about food fraud.

A food fraud database is a collection of information about food fraud incidents and food fraud risks. There are a number of free and paid databases operated by governments, not-for-profits and private companies available worldwide.  The type of data varies from database to database, as does the cost and the features.  For a current list of food fraud databases, check out our post Food Fraud Databases Compared.

2. Email alerts via subscription service:

Email services provide near-to-real-time information about food fraud incidents as they occur. This can be a good way to keep on top of developing food fraud risks.   Below is a list of email subscriptions that can provide information about food fraud.

  • Food Forensics, a laboratory located in United Kingdom, offer a monthly horizon scanning risk newsletter to members.
  • FoodChainID Horizon Scan is a paid subscription service that provides alerts on adulteration and fraud, as well as food safety contamination events.
  • Some trade associations provide email services to members.
  • The Rotten Apple, by Karen Constable (of Food Fraud Advisors), is a weekly newsletter that includes trends and analysis as well as a summary of updates made to the Trello Food Fraud database each week.
  • Government-run food safety and food regulatory bodies in some jurisdictions send emails to interested parties.  Contact your local authority for more information.

3.  Direct intelligence:

Direct intelligence is another means of gathering information about the occurrence of food fraud for a given food or ingredient.

  • Information can be obtained by asking law enforcement officials and government departments.
  • Suppliers can provide information about their material types.
  • Trade associations can be approached for information on food fraud and emerging issues.
  • Conferences and webinars about food fraud and food defence are held regularly and these can be a good source of information.

STEP 2. SPECIFIC SUSCEPTIBILITY

In step one you considered the general likelihood of food fraud occurring for the food or ingredient you are assessing.

In step two you must consider the characteristics of your specific material as it is purchased by your food business.

Characteristics that should be considered include those associated with your supply chain, purchasing policies and the format of the material, for example whether it is a powder or liquid or solid.

Each characteristic should be considered with regards to how it could affect the degree to which a person may be motivated to fraudulently adulterate the material and how it could allow a person to:

a) gain access to the material,

b) commit fraud by adulterating, substituting or diluting the material or

c) avoid detection.

To ensure that all relevant characteristics are considered it is best to use a checklist

Checklists help to ensure that all relevant information has been considered.

You can create your own checklist or use a checklist prepared by experts such as those found in a proprietary Vulnerability Assessment Tool.

There are a number of fraud assessment tools available on-line, with differing degrees of usefulness (some are really annoying to use!).  The most comprehensive checklist for food fraud vulnerability assessments can be found in Food Fraud Advisors’ Vulnerability Assessment Tools.

Need more help?  Get easy-to-use, comprehensive downloadable templates in our online training course.

Visit our training academy today

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Food Fraud, Learn, Vulnerability Assessments Tagged With: likelihood, VACCP

6th April 2022 by foodfraudadvisors

Saffron Fraud (Everything You Ever Wanted to Know)

What is Saffron?

Saffron is a spice made from the dried stigma (part of the flower) of the saffron plant (Crocus sativus). You can see the red stigmas in the pictures.

Saffron flowers showing the red coloured stigmas. Image credit: Lorenzo Lamonica

 

Why is Saffron Vulnerable to Food Fraud?

Genuine saffron is harvested by hand, highly prized for its colour and flavour and very expensive.  In fact, it is the most expensive spice and costs between USD $1,100 to $11,000 per kg.  The international saffron market was worth US $430 million in 2018.

Saffron trade is complicated.  Saffron’s most important growing areas are in Iran, Greece, Morocco and India. Afghanistan and Spain are also important sources of saffron.  Saffron labelled Spanish is mostly grown in other countries but packed in Spain. Iran accounts for most global production at 90% – 93% but only accounts for 40% of direct global exports, according to the report (confusing!), apparently because the Iranian saffron is resold by other countries.

With so much of its production in one country, and with a short harvesting season, saffron supply is extremely vulnerable to weather events.  For example, there was a tripling of prices from 2006 to 2009 because of heavy frost in Iran in 2007.  Climate change is a threat, with increased moisture in some areas leading to more fungal plant diseases, and drought in other areas limiting yields.

Saffron Fraud

Saffron is one of the most frequently adulterated foods.  Powdered saffron is more at risk than whole saffron.

The biggest food safety issue with saffron fraud is probably the use of synthetic dyes to boost the colour of fraudulent whole saffron and saffron powder. Sudan I-IV and Rhodamine B dyes have been found in saffron and are considered potentially genotoxic and carcinogenic.

Saffron threads. Photo by Syed F Hashemi

 

Adulterants in Whole Saffron

Here are some of the things that are added to saffron to fraudulently increase its value.

  • Parts of saffron flowers, including the yellow style and the white style.
  • Filaments from other plants, including corn fibres, safflower stigmas, calendula stigmas, pomegranate fruit fibres
  • Filaments from other sources including silk.  Adulterant filaments may be dyed with plant dyes including beetroot, pomegranate, fruit peel.
  • Liquids that are added to increase weight, including oils, glycerin and honey
  • Dyes and aroma compounds as listed below

Adulterants in Saffron Powder

Here are some of the things that are added to saffron powder to fraudulently increase its value.

  • Turmeric powder
  • Paprika powder
  • Ground seeds of sweet fennel, or annatto
  • Dried marigold flowers
  • Gardenia (Cape Jasmine) extract, for their crocetin esters which are also in saffron
  • Natural dyes from flowers and roots
  • Artificial dyes including erythrosine, ponceau 4R, tartrazine, Sudan dyes, magenta III and rhodamine B
  • Safranal, which is a synthetic aroma compound

Also, there are historical reports of fillers added for increasing the product’s weight, including chalk, gypsum and heavy spar (barium sulfate)

Other Types of Fraud (Non-Adulteration-Type Food Frauds)

  • Selling Philippine saffron or “saffron flowers” as if they are real saffron (C. sativus).  They are instead safflower or kasubha.
  • Exhausted saffron sold as whole saffron
  • Coloured paper shreds sold as saffron
  • Provenance fraud, in which the geographical origin of the saffron is misrepresented

Saffron testing

Testing is a challenge.  Microscopic inspections can be done on powdered as well as whole saffron, but they are time-consuming and expensive.  In addition, visual examinations won’t necessarily recognise adulteration with colourants or safranal.

Some DNA-based tests struggle to differentiate safflower from saffron, because they are closely related.  DNA tests also don’t find safranal or dyes.  Spectroscopic methods can be simple and quick but they are not very sensitive and won’t pick up all adulterants.   There are many other authenticity test methods, each with its own challenges.  It is recommended that a suite of complementary tests be used to cover all types of adulteration and fraud.  Provenance testing has been successfully done using stable isotope methods.

This piece was orginially published in The Rotten Apple, a weekly newsletter about food safety, food fraud and sustainable supply chains. 

Take a Look at The Rotten Apple Newsletter

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Adulteration, Food Fraud, Learn

14th March 2022 by Karen Constable

How to do a Vulnerability Assessment for Storage and Distribution

From the desk of Karen Constable, our Principal Consultant

The other day, a frustrated food safety manager wrote to me, wanting help to figure out how to do a food fraud vulnerability assessment for storage and distribution (BRCGS Issue 4).

It’s such a tricky one, because storage and distribution (S & D) facilities have so little direct control over product choices.  And the BRC standard is so wordy!

The good news is that when BRC first added product fraud to their storage and distribution standard in 2018 (Issue 3), they wrote a position paper that attempted to provide some guidance.

Even though Issue 4 is a bit different to Issue 3, the guidance in the position paper is still useful.

Here’s just a small portion of guidance from BRC Position Paper:

“The Standard does not define the exact process that the company must follow when completing the vulnerability assessment;however, it is likely to incorporate the following steps:

  • draw up a list of products and services and the controls that are already in operation (e.g. approval of suppliers by customers, pre-packaged products purchased)
  • consider any relevant information regarding potential fraud for each product and service
  • complete a risk assessment on the vulnerability of the products.

The output of the vulnerability assessment is usually a ranking or scoring of the materials to identify those which need additional controls. The ranking and actions required could, for example, be as follows:

  • Very high – a high-profile product with recent reports of adulteration or substitution published by regulatory authorities. Action or monitoring is required to ensure that only genuine materials are purchased.
  • High – a high-profile product that provides an attractive target for potential substitution or adulteration. Some action and/or monitoring is required to ensure that only genuine materials are purchased.
  • Low – this product is unlikely to be a target for substitution or adulteration. However, a re-assessment may be necessary if new information becomes available.
  • Negligible – no further action is required as the product is extremely unlikely to be a target for fraud.”

 

There’s more in the position paper, which you can read or download from the BRC Website: https://www.brcgs.com/media/1055426/sd308-position-statement-accommodating-the-requirements-of-gfsi-benchmark-72-into-issue-3-v2-12082019.pdf

If you are completely new to vulnerability assessments, we have step-by-step instructions on our website, which might help a little if you haven’t seen it yet.  Plus, our on-demand, online food fraud training might also help.  Although both of these resources were created primarily for food manufacturers the concepts of vulnerability assessments also apply to S & D facilities.

I can also assist with custom one-on-one consulting, guidance/feedback or custom templates if you need.   Just get in touch and we can hop on a phone call to discuss.

Regards,

Karen Constable

Food Fraud Advisors

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Learn, Vulnerability Assessments

24th February 2022 by foodfraudadvisors

Food Fraud Databases Compared

Updated 26 July 2022

A food fraud database is a collection of information about food fraud incidents and food fraud risks. There are paid and free databases operated by governments, not-for-profits and private companies.  The type of data varies from database to database, as does the cost and the features.

Pay-To-Use Databases

There are four well-known, pay-to-use food fraud databases.  Since 2020, company mergers, acquisitions, and name changes have made it hard to understand which database is which – and which one is best for you.  The four best-known commercially operated databases are listed below.

(1) EMAlert by Battelle.  This database has been around for many years, but no longer has a high profile.  It still exists, but contains information for only a limited number of commodities.  https://www.emalert.org/

(2) HorizonScan (FERA).  This tool was developed by the UK government’s Food and Environment Research Agency (FERA). It is widely used and includes alert systems and information about food safety, food fraud and suppliers.  https://horizon-scan.fera.co.uk/

(3) Decernis’ Food Fraud Database (formerly the United States Pharmacopoeia (USP) Food Fraud Database).  The Decernis Food Fraud Database includes scholarly articles on testing and detection methods as well as food fraud incidents.  https://decernis.com/products/food-fraud-database/

(4) Agroknow’s FoodAkai is the most recently developed tool.  It uses sophisticated AI to analyse data from global food safety agencies to offer insights into hazards in raw materials, ingredients and products.  Like HorizonScan, it includes food safety as well as food fraud issues and incidents.  https://agroknow.com/foodakai/

FoodChainID is another big name in food fraud tools and they also list a product called HorizonScan™ on their website.  Confusingly, FoodChainID’s HorizonScan™ is the same as FERA HorizonScan.  The difference is in the regional distribution rights for each product.  FoodChainID – a company – distributes the HorizonScan product in the USA.  FERA distributes it in non-US markets.

FoodChainID also has a partnership with EMAlert and recently bought the company Decernis, which owns the (formerly USP) Food Fraud Database.  This makes FoodAkai the only well-known paid tool that is independent of FoodChainID.

A less well-known paid service is MerieuxNutriSciences’ Safety HUD, which monitors official agencies and other sources for alerts on food safety and frauds. Safety Hud 2.0 | Food Compliance Solutions (mxns.com)

Costs

There is a notable lack of transparency in the pricing of food fraud databases.  Fees to access the databases are usually levied on a subscription basis.  The cost varies depending on the number of users and whether you are a consultant or a single food company.

All the databases listed above offer either a free trial or a guided demonstration, so you can compare them to decide which might be best for your company’s needs.

Affiliation

Food Fraud Advisors has no financial relationships with the products or companies listed here, though we do have contacts at each organisation, so if you would like a no obligation introduction, just ask. We do not earn a commission from such introductions.

Free Databases

(1) Food Fraud Advisors’ Food Fraud Risk Information Database (hosted on Trello) is a free and open-access online database of food fraud incidences and emerging threats, organised by food type.  No log-in required.  https://trello.com/b/aoFO1UEf/food-fraud-risk-information

(2) FoodSHIELD is a US Government-Academic partnership.  Access to the FoodSHIELD food fraud and food defense database is limited to representatives from local, state, and federal governments, the military and laboratories that perform analyses.  https://www.foodshield.org

(3) Food Protection and Defense Institute (USA)’s Food Adulteration Incidents Registry. Access by special request only. https://incidents.foodprotection.io/about

(4) Rapid Alert System for Food and Feed (RASFF) is managed by a group of European national food safety authorities and alerts its member states to incidences of food and feed safety and integrity.  RASFF publishes a searchable database for investigating incidences of food fraud.  To learn more about RASFF click here.  For direct access to the database, open the RASFF Portal.

(5) US FDA’s Recalls and Food Safety Alerts, has a searchable database and includes incidents arising from food fraud.  http://www.fda.gov/Safety/Recalls/

 

Which Database Should I Use?

How do I know which database will meet my needs?

 

What are your needs? Check the headings below to see which best describes your company’s needs for food fraud information. 

 

Low budget and/or need information infrequently

If you have a low budget and don’t need to access information often, Decernis’ Food Fraud Database has cost-effective single month or month-to-month subscriptions.

Custom alerts for specific ingredients or foods

All four paid databases allow you to create custom alerts for products, ingredients of interest.  You receive an email or other notification when a new incident occurs.

Food safety and food fraud alerts

HorizonScan and FoodAkai both include food safety hazards as well as food fraud hazards in their reporting and alert systems.

Analytical test methods information

Decernis’ Food Fraud Database includes test method information and research papers.

Large number of users across multiple sites

If you have a high number of users who want to access the database or a very large number of products, HorizonScan and FoodAkai have enterprise level subscriptions so users on different sites can set up their own reports and alerts.

Predictions about future hazards

FoodAkai promises early warning of emerging risks, which are predicted using AI technology. The makers of FoodAkai say their software predicted the multi-country, multi-product ethylene oxide in sesame recall disaster of 2020-2021.

Students, occasional needs, non-food professionals

The Food Fraud Information Database hosted on Trello is a great place to start your food fraud journey if you are a student or new to the food industry.  It is free and contains good summaries of the types of food fraud that affect various foods.  However, it is not easily searchable (you can buy a searchable ‘snapshot’ in Excel form) and it does not provide custom alerts.  Incidents added to the database are mostly drawn from international media and are heavily weighted to English language media, so are not suitable for accurate counting or mapping of incidents.

Other free information about European and North American foods

RASFF (Europe) and FDA Recalls and Food Safety Alerts (USA) mostly contain food safety incidents, with few food fraud incidents.  Much of the data derives from cross-border food movements, especially in RASSF.  They are both free and searchable and can be a useful adjunct to the free food fraud database on Trello.

 

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Food Fraud, Horizon Scanning, Learn

  • 1
  • 2
  • 3
  • …
  • 5
  • Next Page »

MORE FROM FOOD FRAUD ADVISORS

Food Fraud in Food Additives

Food additives such as flavour-enhancers, gums, enzymes, emulsifiers, stabilizers, anti-caking agents, anti-oxidants and … [Read More...]

Important Announcement About the Food Fraud Risk Information Database on Trello

On 1st September 2022, there was a major change to Food Fraud Advisors' Food Fraud Risk Information Database on … [Read More...]

food vulnerability assessment

Food Safety Standards Compared (2022)

    When it comes to food fraud, each food safety standard has slightly different food fraud … [Read More...]

Investigating Susceptibility to Food Fraud

Updated 26th June 2022 Some foods are more susceptible than others to economically motivated adulteration, … [Read More...]

Top 5 Food Frauds of 2022 (so far)

Food Fraud Advisors' Principal, Karen Constable, shares her top five food frauds for 2022. At the time of writing, … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2022 Food Fraud Advisors · All Rights Reserved · Privacy Policy