The Supplier Questionnaire can be used with the Vulnerability Assessment Tool (BRC method) for food fraud.
To access the Supplier Questionnaire, please purchase a copy of the tool, or contact us today.
The Supplier Questionnaire can be used with the Vulnerability Assessment Tool (BRC method) for food fraud.
To access the Supplier Questionnaire, please purchase a copy of the tool, or contact us today.
What are you buying?
You are purchasing the right to download, populate, save and print the spreadsheet file Vulnerability Assessment Tool for BRC, created and published by Food Fraud Advisors © 2015-2020 and made for food fraud vulnerability assessments.
You may make as many copies of the spreadsheet(s) as you need for one food business in one geographical location (usually a manufacturing site). Licence terms and conditions.
Please note that many of the cells in the sheets are password protected, so you will not be able to edit the wording of the questions nor the automatically generated answers. To understand which parts are password protected, download our free trial version: Try it free
To use the Vulnerability Assessment Tool you will need:
Questions? Click here for frequently asked questions and their answers plus access to support
Buy it now, download it instantly and complete your first food fraud vulnerability assessment in less than one hour.
Price: US$59.00
Talk to a friendly expert for
Thirty minutes (30 minutes) of advice by telephone, Skype voice or Skype instant messaging is available, free of charge, no obligation, no contracts. Confidentiality is assured, however you may remain anonymous or keep your employer’s identity anonymous if you wish.
Special offer for purchasers in Sydney Australia metropolitan region: book an in-person introductory consultation, and have Food Fraud Advisors’ Principal Consultant visit your site for $0.
Got questions? Just ask, we are here to help!
Ask Karen a question
Food Fraud Advisors’ principal Karen Constable, a leading international food fraud expert, will prepare a vulnerability assessment for one product or group of similar products manufactured at one site and containing up to 30 ingredients, using the method recommended by the Food Fraud Initiative of Michigan State University or the method recommended by the British Retail Consortium (BRC) for compliance with BRC Issue 8. You may use pseudonyms and code names to protect the identity of the food business and product names, although accurate descriptions of food items are required.
The scope of the assessment is vulnerability to economically motivated adulteration, substitution or dilution of the food ingredients or raw materials prior to receipt at the site of manufacture of the product. The assessment does not include vulnerabilities to adulteration or tampering that could occur on the site of manufacture of the product.
You will receive a document in Microsoft Word format that contains:
• the name of the product or product group
• the date of the assessment,
• the date that the assessment should be reviewed,
• the name of the person who prepared the assessment,
• page numbers and other standard document control features (can be edited by the purchaser),
• purpose and scope of the assessment,
• the estimate of the likelihood of economically motivated adulteration, substitution or dilution for the product group and each of its ingredients
• the estimate of the severity of impact of fraud on the product group (or estimate of likelihood of detection for each ingredient if BRC method is specified)
• a risk matrix with results marked in the relevant box
• a conclusion about the overall vulnerability of that product group (and each ingredient separately if the BRC method is specified)
• information showing how the estimates of likelihood and severity were reached.
The document is unprotected and can be edited, printed, copied, amended, re-used and saved by the purchaser.
Got questions? Just ask, we are here to help!
Ask a question