Food Fraud Advisors

  • Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Archives for food defense

24th July 2021 by foodfraudadvisors

HACCP, VACCP and TACCP

  1. HACCP (Hazard Analysis Critical Control Point)  Pronounced ‘hassup’.  HACCP = keeping food safe from accidental and natural risks to food safety.
  2. VACCP (Vulnerability Assessment Critical Control Point) Pronounced ‘vassup’.  VACCP = prevention of economically motivated food fraud.
  3. TACCP (Threat Assessment Critical Control Point) Pronounced ‘tassup’.  TACCP = prevention of malicious threats to food, such as sabotage, extortion or terrorism.  This type of malicious threat is also referred to as Intentional Adulteration within the US Food Safety Modernization Act.  Outside of the US, TACCP is more often called ‘food defense’.

HACCP

  • HACCP is a set of principles designed to control and prevent food safety risks during food production.
  • HACCP is not enforced or regulated by any single organization.
  • The ideas of HACCP form the basis of every food safety management system standard that is in use today, including GFSI food safety standards.
  • The principles of HACCP are codified (written down) by the Food and Agriculture Organization of the United Nations (FAO), in a set of documents called the Codex Alimentarius , a latin phrase which translates to “Book of Food”.
  • FAO’s General Principles of Food Hygiene CXC 1-1969 contains the HACCP principles (sometimes called HACCP Codex).  Download the 2020 revision of the HACCP Code here: http://www.fao.org/fao-who-codexalimentarius/codex-texts/codes-of-practice/ (click the green check/tick mark on the right side of the page to download).

VACCP and TACCP

  • VACCP and TACCP are terms that emerged during the 2010s as standards agencies, government regulators and industry groups started considering methods to prevent food fraud and malicious tampering.
  • VACCP is for food fraud.
  • TACCP is for food defense.
  • The acronymns VACCP and TACCP are designed to leverage the food industry’s familiarity with HACCP.  However, the critical control ‘points’ in a VACCP and TACCP plan are nothing like the ‘critical control points’ in a HACCP plan.
  • The control points in a HACCP plan are operational steps in a food manufacturing process.  The points are connected to processes over which the food manufacturer can exercise direct control.
  • For deliberate tampering (food fraud and food defense) the controls do not fit onto a linear set of processes, they do not fit the definition of ‘critical control points’ in HACCP.
  • The terms VACCP and TACCP are falling out of favor within the food safety industry.  They are not referenced specifically within any of the GFSI food safety standards, nor within the USA’s FSMA.
  • Instead of ‘”VACCP” and “TACCP”, it is much better to say “Vulnerabilities to food fraud” or “threats of malicious tampering (=food defense)”.

More acronyms demystified here.

Take a free short course on food fraud here.

food safety food fraud

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Learn, TACCP, VACCP

10th August 2019 by foodfraudadvisors

Learn the lingo; food fraud terms explained

Food fraud occurs when food or drink is sold in a way that deliberately misleads or deceives consumers or customers for financial gain (Food Fraud Advisors, 2015)

(other definitions)

Food fraud occurs in two different forms:

1. Fraudulent activity that does not involve tampering with the food itself:

This includes activity such as avoidance of taxes, duties and quota restrictions (fishing), fraudulent paperwork such as forged importation documents, misrepresentation of origin, changing best-before dates and counterfeiting of popular brands.

2. Adulteration of food for economic gain:

This is sometimes referred to as economically motivated adulteration or EMA.  In this phrase, the word ‘adulteration’ is used to encompass many types of tampering, such as adding unauthorised substances, substituting undeclared substances for genuine components of a food or diluting a food product with cheaper substances.

Food fraud is a type of food crime, with food crime including food fraud and other activities such as the use of food shipments to mask drug trafficking and money-laundering through the trading of food and food commodities.

food fraud,defense,safety,security

Food fraud and the risks it presents to the food industry is a separate subject to food safety, although fraud-affected food can be unsafe.  Food safety relates to unintentional contamination of food and the presence of naturally occurring contaminants.

Food defence (food defense) is a term that has come to be defined as the effort to prevent acts of adulteration that are intended to cause harm to a food business or to consumers, such as acts of terrorism or attempted extortion.

Food security, as defined by the World Health Organisation exists “when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life”.

Risk or vulnerability?  In the language of food fraud, the term risk is usually replaced with the term ‘vulnerability’, so food standards bodies are increasingly talking about vulnerability assessments rather than risk assessments.  ‘Vulnerability’ is used because food fraud ‘risks’ do not exactly fit with the accepted definition of risk as something that has occurred frequently, will occur again and for which there is enough data to make quantitative assessments.  Vulnerability is a better term for food fraud, due to the fact that the ‘risk’ of a specific fraudulent activity occurring cannot be quantitatively assessed.

Horizon scanning is another term that has been co-opted to the language of food fraud.  Horizon scanning is the act of looking for and analysing threats and opportunities that will emerge in the medium to long term.  It is used across many industries, including the financial and health care industries.  Within the food industry, horizon scanning refers to the act of collecting information about current trends in food production and predicted incidences that could increase the likelihood of food fraud for a particular food material.  For example, climate change is likely to affect coffee production which could drive up prices and increase fraudulent activity in that sector.  Click here for the complete low-down on horizon scanning.

TACCP: Threat Assessment Critical Control Point.  TACCP = prevention of malicious threats to food.

VACCP: Vulnerability Assessment Critical Control Point.  VACCP = food fraud prevention.  Learn more about TACCP and VACCP here.

Intentional Adulteration:  Although food fraud activities often involve the intentional adulteration of food with unauthorised substances, within the food safety industry, Intentional Adulteration has recently been given a more specific meaning.  And it is not related to food fraud at all.  It is related to food defense, and more specifically to activities intended to cause wide scale harm to consumers.  There is a rule within the USA’s Food Safety Modernization Act (FSMA), that addresses these activities.  It is known as the Intentional Adulteration rule.  According to the US FDA (2019), Intentional Adulteration is the deliberate contamination of food with a biological, chemical, radiological, or physical agent by an individual or group of individuals with the intent to cause wide scale public health harm.  How to protect against intentional adulteration. 

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Learn, TACCP, VACCP

30th September 2018 by foodfraudadvisors

Five things every food safety professional should know about food fraud

1. Food fraud is in the spotlight

Food fraud has been around for thousands of years but has become more prominent in the food safety and food certification industry in the last few years, following the European horse meat scandal of 2013.  Although no food safety problems arose during that incident, it was realised that similar incidences could have serious impacts on food safety.  For that reason, food fraud prevention requirements were introduced into all major food safety management system standards between 2017 and 2020.

2. New terminology

Definitions related to food fraud and food integrity have been refined in the last five years and there is now consensus on the four key terms below, although the term food security still causes confusion.

food fraud,defense,safety,security

  • Food safety relates to issues of unintentional contamination, with the aim of reducing exposure to naturally occurring hazards, errors and failures in food systems.
  • Food fraud was defined by  Spink and Moyer (2011) as “a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product for economic gain.”  More recently that definition has been updated to capture all types of food crime: Food fraud is deception, using food, for economic gain (Food Fraud Initiative, Michigan State University).  Within food fraud there are types of fraud that involve tampering with the food by adulterating or diluting the food.  This type of fraud is sometimes called ‘economically motivated adulteration’ (EMA).  Other types of fraud that do not involve adulteration are also deemed to be ‘food fraud’.  These include black market and grey market sales, theft, illegal importing, avoidance of tax and counterfeiting.
  • Food defence is a term that has come to be defined as the effort to prevent acts of adulteration that are intended to cause harm to a food business or to consumers, such as acts of terrorism or attempted extortion.
  • Food security is unrelated to food fraud but is instead an issue of food supply and food access for populations who are under threat from food shortages.

Other terms to know:

  • Vulnerability assessments are assessments of vulnerability to food fraud, either at the raw material, product or facility level.  Within the USA the term vulnerability assessment can also refer to a food facility’s vulnerability to malicious tampering of product on its site, either by its own employees or external forces.   Learn more about vulnerability assessments.
  • Horizon scanning is the act of looking for and analysing threats and opportunities that will emerge in the medium to long term.  Within the food industry, horizon scanning means the act of collecting information about current trends and predicted incidences that could increase the likelihood of food fraud for a particular food material.  For example, climate change is likely to reduce coffee production which could drive up prices and increase fraudulent activity in that sector.
Coffee,authentic,fraud,horizon scanning
Coffee harvests are being affected by climate change

 

3. Food safety standards have become more rigorous

Food fraud prevention and mitigation measures are now a requirement of all major food safety management system standards.  The Global Food Safety Initiative (GFSI), a group of food companies whose mission is to harmonize, strengthen, and improve food safety management systems around the globe, sets guidance for food safety standards.  Well known GFSI standards include BRC, FSSC 22000 and SQF.  Between 2015 and 2017, all GFSI food safety standards were updated to include requirements for food companies to perform a food fraud vulnerability assessment and have a food fraud mitigation plan in place.   Click here for the GFSI Food Fraud Position Paper.

The new requirements for vulnerability assessments and mitigation plans require more resources for most food businesses, particularly those with large numbers of raw materials and suppliers.

4. There are new regulatory requirements for food businesses

The Food Safety Modernization Act (FSMA) in the USA has been implemented for most food businesses in the previous few years.  Within the FSMA rules, food businesses are required to address hazards from adulterants introduced for the purposes of economic gain.  These must be included in food safety hazard analyses and if hazards are found, preventive controls must be implemented.  This means that economically motivated adulteration (EMA), a subset of food fraud, must be addressed under the new FSMA rules.

The Food Safety Modernization Act (FSMA) also includes specific requirements for ‘food defense’ which are aimed at preventing malicious adulteration and tampering as well as fraudulent adulteration.  This is known as the Intentional Adulteration (IA) rule.  The IA rule is being progressively implemented in the USA.  FSMA rules for IA will also be enforced internationally for all food facilities that manufacture food for export to America.  Click here for US FDA’s food defense guidance

food defense,vulnerability assessment,FSMA,
All American food companies will be required to have a food defense plan

 

5.  Detection of food fraud remains a challenge, despite new lab techniques

Our ability to detect food fraud has improved over the last few years, but challenges remain.  There are many technologies available, from traditional ‘wet’ chemical tests to spectroscopy and chromatography to modern forensic DNA methods.   Protein isoelectrofocusing (a type of electrophoresis) is a conventional test that provides information about the source of various milk proteins in a cheese and can be used to detect cows milk in “buffalo milk” mozzarella, for example.  PCR (polymerase chain reaction) techniques, in which a cow milk-specific gene is amplified and detected are being developed for cheese testing and they are claimed to be more specific.

Coffee variety testing has traditionally been done using Fourier transform infrared spectroscopy, a method that exploits the different amounts of chlorogenic acid and caffeine in robusta and arabica varieties.  However, a new method that exploits the different mitochondrial genetic markers in the two varieties will soon be able to achieve the same results quickly and easily in the field with ‘lab on a chip’ technology.

Researchers looking for fraudulent aloe vera can exploit its distinctive NMR (nuclear magnetic resonance) profile, due to the position of acetate groups within a key polysaccharide in the plant.  The NMR profile represents a ‘fingerprint’ for aloe vera.

Another type of ‘fingerprinting’ is based on the spectra created by different ratios of stable isotopes.  For example, it is possible to tell the difference between corn-fed and wheat-fed chicken, using stable isotope ratio mass spectrometry by comparison with databases of reference samples.  This method has also been used to check provenance claims for meat and wine products.

Authentic beef mince
What meat is that?

 

Despite the surge in technology surrounding food fraud detection, it remains difficult to detect fraudulent adulteration unless you know what you are looking for.  As an example, DNA testing can be used to determine if beef mince has been made from a cow but can’t tell me whether it has been adulterated with undeclared beef offal.  Olive oil that is suspected of having been adulterated with other edible oil can easily be tested for such adulteration in a lab test, but verifying its country of origin is more difficult.  Adulteration of ‘arabica’ coffee with the cheaper robusta variety can be detected with a simple test but that same test will not disclose whether ground coffee has been adulterated with cheaper fillers such as corn, soybean or wheat, a practice which is common in some markets.  There are now a number of ‘fingerprinting’ techniques that are designed to ‘flag’ any sample that is not authentic, no matter what the adulterant, however they can only be used if there is already an extensive database of authentic samples with which to compare the suspect sample.  Australian honey brand owners who were caught with supposedly inauthentic honey in an NMR-based fingerprint test claimed that the database used in the testing, which was done in Germany, was not suitable for testing Australian honeys.  Read more about the Australian honey scandal.

We have a lot of tools in our arsenal to answer questions about fraudulent food but those tools are only useful if we ask the right questions.

Need to learn more?  Want practical advice from expert food scientists? Click here for a free introductory consultation.

 

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email

Filed Under: Food Defense, Food Fraud, Food Safety, Learn, VACCP

MORE FROM FOOD FRAUD ADVISORS

Honey Fraud – Much Worse Than We Thought?

From the desk of Karen Constable, principal consultant at Food Fraud Advisors. My daughter loves honey and eats a lot … [Read More...]

5 Food Fraud Trends to Look Out For in 2023

Our Principal Karen Constable has been following food fraud news since 2015.  Every week she personally reads, watches … [Read More...]

Food Fraud Databases Compared

Updated 29 January 2023 A food fraud database is a collection of information about food fraud incidents and food … [Read More...]

Ten Years After Horsegate – A Decade to Celebrate

The horsemeat scandal of 2013 prompted action from the food industry and (some) governments against food fraud.  Ten … [Read More...]

Food Fraud in Food Additives

Food additives such as flavour-enhancers, gums, enzymes, emulsifiers, stabilizers, anti-caking agents, anti-oxidants and … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2023 Food Fraud Advisors · All Rights Reserved · Privacy Policy