Food Fraud Advisors

  • Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Archives for VACCP

19th October 2018 by foodfraudadvisors

Raw Material Specifications

Raw material specifications are an important defence against food fraud for all food businesses.  Whether you are a restaurant, a specialty grocer, delicatessen, central kitchen, hotel or manufacturer, you are susceptible to food fraud.  Robust specifications can help to protect your food business from inadvertently purchasing, using or serving fraudulent ingredients and raw materials.  They can also help to protect your business from the financial fall-out if things go wrong.

Fraudulent materials include:

  • adulterated food ingredients, such as melamine added to milk powder to increase the apparent protein content
  • diluted food, such as dried oregano leaves diluted with cheaper leaves
  • substituted food, such as a cheaper grade of olive oil being substituted for virgin
  • counterfeit food, such as ‘fake’ premium vodkas and brandies
  • misrepresented food, such as conventionally grown vegetables that are sold as organic
  • packaging materials made with unauthorised additives, such as banned phthalates

Modern Dairy food-processing industry Worker On A Milk Factory

Specifications for raw materials and ingredients should contain the following information:

  1. Name of the material
  2. A description of the material, including biological, chemical and physical characteristics
  3. Composition of the material, including additives and processing aids
  4. Country of origin
  5. Method of production
  6. Packaging format/s or unit of measure
  7. Delivery method/s
  8. A description of the labelling, lot ID and coding for traceability
  9. Storage conditions and shelf life
  10. Preparation and/or handling before use
  11. Acceptance and rejection criteria
  12. Requirements for certificates of analysis for high risk materials or vulnerable materials
  13. Special requirements such as allergen information, organic status, GMO status, fair-trade and ethical sourcing policies
  14. Information about compliance with statutory and regulatory requirements, where relevant
  15. A requirement for suppliers to notify of any authenticity issues with the product
  16. A requirement for suppliers to notify of any changes to the product
  17. Formal agreement between the supplier and purchaser
  18. Document control features, such as author, date and page numbers.

Download our excellent template today

How to develop a raw material specification:

  • Create a template that suits the needs of your business.  A tabular format is easy to work with.  Include all of the sections above, even if you don’t think you will use them now, or if they are not relevant to some of your materials.  You can always leave them blank.
  • You should create a separate specification for every unique material, do not create category-level specifications.
  • Obtain product specifications from your suppliers and use them to add key criteria to your specifications.
  • Add any extra criteria that will help you to control the quality, safety and authenticity of your products.  It is useful to imagine that you are receiving the material at your door or loading dock; what would you like to know about the material before you accept it? For example: Is it at the correct temperature?  Is it properly labelled?  Is the packaging undamaged with no evidence of tampering?  Is the material free of undeclared allergens?  Does it have the fat content you expect?  Has it been aged (meat) for as long as you expect?  Is it free from salmonella?  Use these questions to check that you have included all important criteria in your specification.
  • Don’t forget to include requirements for suppliers to have a food safety certificate, licence, approval or registration, where relevant.
  • If you are purchasing materials under fixed supplier contracts (as would be the case for  food manufacturers), the draft specifications will need to be approved by your purchasing department and by the suppliers themselves before they can be formally issued and implemented.
  • Review each specification at least annually and update the issue/review date.

Need help?

Contact Us Today

Our food safety and authenticity experts can develop your purchasing specifications. Click here for a free introductory consultation.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Learn, VACCP

30th September 2018 by foodfraudadvisors

Five things every food safety professional should know about food fraud

1. Food fraud is in the spotlight

Food fraud has been around for thousands of years but has become more prominent in the food safety and food certification industry in the last few years, following the European horse meat scandal of 2013.  Although no food safety problems arose during that incident, it was realised that similar incidences could have serious impacts on food safety.  For that reason, food fraud prevention requirements were introduced into all major food safety management system standards between 2017 and 2020.

2. New terminology

Definitions related to food fraud and food integrity have been refined in the last five years and there is now consensus on the four key terms below, although the term food security still causes confusion.

food fraud,defense,safety,security

  • Food safety relates to issues of unintentional contamination, with the aim of reducing exposure to naturally occurring hazards, errors and failures in food systems.
  • Food fraud was defined by  Spink and Moyer (2011) as “a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product for economic gain.”  More recently that definition has been updated to capture all types of food crime: Food fraud is deception, using food, for economic gain (Food Fraud Initiative, Michigan State University).  Within food fraud there are types of fraud that involve tampering with the food by adulterating or diluting the food.  This type of fraud is sometimes called ‘economically motivated adulteration’ (EMA).  Other types of fraud that do not involve adulteration are also deemed to be ‘food fraud’.  These include black market and grey market sales, theft, illegal importing, avoidance of tax and counterfeiting.
  • Food defence is a term that has come to be defined as the effort to prevent acts of adulteration that are intended to cause harm to a food business or to consumers, such as acts of terrorism or attempted extortion.
  • Food security is unrelated to food fraud but is instead an issue of food supply and food access for populations who are under threat from food shortages.

Other terms to know:

  • Vulnerability assessments are assessments of vulnerability to food fraud, either at the raw material, product or facility level.  Within the USA the term vulnerability assessment can also refer to a food facility’s vulnerability to malicious tampering of product on its site, either by its own employees or external forces.   Learn more about vulnerability assessments.
  • Horizon scanning is the act of looking for and analysing threats and opportunities that will emerge in the medium to long term.  Within the food industry, horizon scanning means the act of collecting information about current trends and predicted incidences that could increase the likelihood of food fraud for a particular food material.  For example, climate change is likely to reduce coffee production which could drive up prices and increase fraudulent activity in that sector.
Coffee,authentic,fraud,horizon scanning
Coffee harvests are being affected by climate change

 

3. Food safety standards have become more rigorous

Food fraud prevention and mitigation measures are now a requirement of all major food safety management system standards.  The Global Food Safety Initiative (GFSI), a group of food companies whose mission is to harmonize, strengthen, and improve food safety management systems around the globe, sets guidance for food safety standards.  Well known GFSI standards include BRC, FSSC 22000 and SQF.  Between 2015 and 2017, all GFSI food safety standards were updated to include requirements for food companies to perform a food fraud vulnerability assessment and have a food fraud mitigation plan in place.   Click here for the GFSI Food Fraud Position Paper.

The new requirements for vulnerability assessments and mitigation plans require more resources for most food businesses, particularly those with large numbers of raw materials and suppliers.

4. There are new regulatory requirements for food businesses

The Food Safety Modernization Act (FSMA) in the USA has been implemented for most food businesses in the previous few years.  Within the FSMA rules, food businesses are required to address hazards from adulterants introduced for the purposes of economic gain.  These must be included in food safety hazard analyses and if hazards are found, preventive controls must be implemented.  This means that economically motivated adulteration (EMA), a subset of food fraud, must be addressed under the new FSMA rules.

The Food Safety Modernization Act (FSMA) also includes specific requirements for ‘food defense’ which are aimed at preventing malicious adulteration and tampering as well as fraudulent adulteration.  This is known as the Intentional Adulteration (IA) rule.  The IA rule is being progressively implemented in the USA.  FSMA rules for IA will also be enforced internationally for all food facilities that manufacture food for export to America.  Click here for US FDA’s food defense guidance

food defense,vulnerability assessment,FSMA,
All American food companies will be required to have a food defense plan

 

5.  Detection of food fraud remains a challenge, despite new lab techniques

Our ability to detect food fraud has improved over the last few years, but challenges remain.  There are many technologies available, from traditional ‘wet’ chemical tests to spectroscopy and chromatography to modern forensic DNA methods.   Protein isoelectrofocusing (a type of electrophoresis) is a conventional test that provides information about the source of various milk proteins in a cheese and can be used to detect cows milk in “buffalo milk” mozzarella, for example.  PCR (polymerase chain reaction) techniques, in which a cow milk-specific gene is amplified and detected are being developed for cheese testing and they are claimed to be more specific.

Coffee variety testing has traditionally been done using Fourier transform infrared spectroscopy, a method that exploits the different amounts of chlorogenic acid and caffeine in robusta and arabica varieties.  However, a new method that exploits the different mitochondrial genetic markers in the two varieties will soon be able to achieve the same results quickly and easily in the field with ‘lab on a chip’ technology.

Researchers looking for fraudulent aloe vera can exploit its distinctive NMR (nuclear magnetic resonance) profile, due to the position of acetate groups within a key polysaccharide in the plant.  The NMR profile represents a ‘fingerprint’ for aloe vera.

Another type of ‘fingerprinting’ is based on the spectra created by different ratios of stable isotopes.  For example, it is possible to tell the difference between corn-fed and wheat-fed chicken, using stable isotope ratio mass spectrometry by comparison with databases of reference samples.  This method has also been used to check provenance claims for meat and wine products.

Authentic beef mince
What meat is that?

 

Despite the surge in technology surrounding food fraud detection, it remains difficult to detect fraudulent adulteration unless you know what you are looking for.  As an example, DNA testing can be used to determine if beef mince has been made from a cow but can’t tell me whether it has been adulterated with undeclared beef offal.  Olive oil that is suspected of having been adulterated with other edible oil can easily be tested for such adulteration in a lab test, but verifying its country of origin is more difficult.  Adulteration of ‘arabica’ coffee with the cheaper robusta variety can be detected with a simple test but that same test will not disclose whether ground coffee has been adulterated with cheaper fillers such as corn, soybean or wheat, a practice which is common in some markets.  There are now a number of ‘fingerprinting’ techniques that are designed to ‘flag’ any sample that is not authentic, no matter what the adulterant, however they can only be used if there is already an extensive database of authentic samples with which to compare the suspect sample.  Australian honey brand owners who were caught with supposedly inauthentic honey in an NMR-based fingerprint test claimed that the database used in the testing, which was done in Germany, was not suitable for testing Australian honeys.  Read more about the Australian honey scandal.

We have a lot of tools in our arsenal to answer questions about fraudulent food but those tools are only useful if we ask the right questions.

Need to learn more?  Want practical advice from expert food scientists? Click here for a free introductory consultation.

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Food Defense, Food Fraud, Food Safety, Learn, VACCP

6th May 2017 by foodfraudadvisors

Food Fraud Risk Database

It’s huge, it’s completely free and open-access; no log-in required.  It’s our

Food Fraud Risk Information Database

Compiled by food fraud experts and containing information about hundreds of different food types, including past incidences of food fraud and emerging threats, you can use it to meet the requirements of your food safety management system, for

  • food fraud vulnerability assessments,
  • food safety risk assessments
  • hazards from intentional adulteration requiring preventive controls (FSMA)
  • pre-filtering and
  • horizon scanning for emerging threats

You can choose to ‘watch’ the database to receive notifications every time new information is added.  You can also watch individual food types (say “Beef”) to receive updates for just that food type.

Access is free, although if you want to receive notifications you will need to create a (free) Trello account.  We do not receive income from Trello for new sign-ups.

Check it out today

food fraud risk database
Food Fraud Risk Information database, created by Food Fraud Advisors, hosted by Trello.com

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, Horizon Scanning, VACCP

26th July 2016 by foodfraudadvisors

Future food fraud threats; an introduction to horizon scanning (archived)

Oops, this page has moved!

Click here for horizon scanning information

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, Horizon Scanning, Learn, VACCP, Vulnerability Assessments

12th June 2016 by Karen Constable

Vulnerability assessment methods

There are two general approaches to performing a vulnerability assessment for food fraud.

But first…. for the purposes of this page, a vulnerability assessment is a risk-assessment-style evaluation of a food product or ingredient’s vulnerability to food fraud.  For information about food defense vulnerability assessments (intentional adulteration vulnerabilities), click here.

The two approaches are (1) a conventional risk assessment model or (2) based on the recommendations of the British Retail Consortium (BRC) in their guidance document Understanding Vulnerability Assessment (2015)

Food fraud vulnerability assessmentFood fraud vulnerability assessment BRC

The conventional method is a combination of the likelihood of something occurring versus consequences if that thing occurs.  This method is recommended for all types of food businesses.  It allows businesses to identify their most vulnerable ingredients, products and brands and provides an excellent framework to prioritise mitigation strategies.

The second method is recommended for businesses wishing to meet the requirements of British Retail Consortium (BRC) Food Safety Standard Issue 7 and Issue 8 (clause 5.4.2).  The BRC method does not address the risks from all types of food fraud; it only addresses the risk from adulteration and substitution of raw materials and ingredients.  Therefore it is not recommended for businesses that need to meet the requirements of other GFSI food safety standards such as FSSC 22000 Version 4 (clause 2.1.4.6) or SQF Edition 8.  What are these acronymns?

For more information about how to conduct a vulnerability assessment, take a look at Vulnerability Assessments; What? Why? How?

Vulnerability Assessment Tools
Review my assessment
Prepare an assessment for me

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Learn, VACCP, Vulnerability Assessments

  • « Previous Page
  • 1
  • 2
  • 3
  • Next Page »

MORE FROM FOOD FRAUD ADVISORS

What is a food fraud team? (and what to do if you can’t get one)

A food fraud prevention team is a group of employees in a food business that is responsible for creating, implementing … [Read More...]

Food Fraud Databases Compared

Updated 30 April 2025 A food fraud database is a collection of information about food fraud incidents and food fraud … [Read More...]

What to do About Food Fraud (USA)

I was talking to a new client the other day.  They are based in the United States and had discovered their competitors' … [Read More...]

Paprika, Chilli Powder and Sudan Dye Contamination

Can paprika and chilli powder be “too red”? This post was originally published in The Rotten Apple … [Read More...]

Is Food Fraud to Blame for the Cinnamon-apple Recall (Video)

Our Principal, Karen Constable, explains how high levels of lead may have got into applesauce (video audiogram). For … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2025 Food Fraud Advisors · All Rights Reserved · Privacy Policy · Return and Refund Policy