Food Defense Plan Template

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11
At a glance
Powered by AI
The document outlines a food defense plan including vulnerability assessments and security measures across physical, shipping/receiving, personnel and incident response areas.

The goal of outside security measures is to prevent unauthorized access by people, or entry of unauthorized materials into the facility.

The goal of inside security measures is to protect product from intentional contamination.

Food Defense Plan


[Company Name]

Developed By ____________ [Qualifications]

Implemented By ___________ [ Title]

Implemented on ___________ [Date]


Food Defense Team: 3

Vulnerability Assessment: 4
Section 1: Outside Security Measures 4
1.1 Physical Security 4
1.2 Shipping / Receiving Security 4
1.3 Mail Handling Security 5
Section 2: Inside Security Measures: 5
2.1 General Inside Security 5
2.2 Production Area Security 6
2.3 Storage Security 6
2.4 Ingredients/Water/Ice Security 6
2.5 Chemical Hazardous Material Control Security 7
2.6 Information Security 7
Section 3: Personnel Security Measures 8
3.1 Employee Security 8
3.2 Non-Employee Security (visitors, contractors, guests, customers, truck drivers) 8
3.3 Security Training 8
Section 4 Incident Response Measures 9
4.1 Investigating Security Concerns 9
4.2 Emergency Contact Security 9
4.3 Other Plant Security 10

Vulnerability Mitigation Strategy 11


Food Defense Team:

Name Title Role


Vulnerability Assessment:

Section 1: Outside Security Measures

Goal: to prevent unauthorized access by people, or entry of unauthorized materials into the facility

1.1 Physical Security

Vulnerability Yes No N/A Detail

Are plant boundaries clear and secure to prevent unauthorized entry?

Are entrances secured (locks, alarms, etc.?)

Is the plant perimeter periodically monitored for suspicious activity?

Are other access points (windows, vents) secured?

Is outside storage on the premises protected from unauthorized access?

1.2 Shipping / Receiving Security

Vulnerability Yes No N/A Detail

Are incoming shipments examined for potential tampering?

Are incoming and outgoing vehicles examined for suspicious activity?

Are loading and unloading activities scheduled / monitored?

Is loading dock access controlled (for example, monitored or locked?)


Are incoming shipments secured with locks or seals?

Are outgoing shipments locked or sealed?

1.3 Mail Handling Security

Vulnerability Yes No N/A Detail

Is mail handled aware from food including ingredients and packaging?

Are employees who handle mail aware of proper handling of suspicious mail and US
postal service guidelines?

Section 2: Inside Security Measures:

Goal: to protect product from intentional contamination

2.1 General Inside Security

Vulnerability Yes No N/A Detail

Are suspicious packages reported to appropriate personnel?

Are restricted areas of the establishment clearly identified?

Are previously unattended materials checked before use?

Are unexpected changes in inventory (product or equipment) reported to appropriate


personnel?

Is Emergency lighting in place?


Is an emergency alert system identifiable, tested, and reviewed with emergency
contacts

2.2 Production Area Security

Vulnerability Yes No N/A Detail

Is access to product restricted?

Is access to production equipment restricted (ovens, mixers, etc)

Do records ensure traceability for one step backward, one step forward or both?

2.3 Storage Security

Vulnerability Yes No N/A Detail

Is access to storage areas restricted?

Is stock rotation practiced?

Are labels and packaging materials controlled to prevent theft and misuse?

Are periodic examinations for tampering of materials in storage performed?

2.4 Ingredients/Water/Ice Security

Vulnerability Yes No N/A Detail


Is access to storage tanks for potable water/reuse systems restricted?

Is access to lines that transfer water or ingredients examined and restricted?

Is access to plant ice-making equipment controlled?

Is supplier food safety/security information requested?

2.5 Chemical Hazardous Material Control Security

Vulnerability Yes No N/A Detail

Are chemicals/hazardous materials in a restricted area or secured by lock?

Do you maintain an up-to-date inventory of hazardous materials and chemicals and


investigate discrepancies?

Is potentially hazardous waste (biological or chemical) controlled and disposed of?

2.6 Information Security

Vulnerability Yes No N/A Detail

Is access to sensitive information such as site plans and processing details controlled?

Is access to computer systems protected through firewalls / passwords?


Section 3: Personnel Security Measures

Goal: to ensure that only authorized personnel are in the facility at any time:

3.1 Employee Security

Vulnerability Yes No N/A Detail

Is a method to recognize or identify employees in the facility in place?

Are background or reference checks conducted for new hires?

Do employees have restrictions on what they can bring in and take from the facility?

3.2 Non-Employee Security (visitors, contractors, guests, customers, truck drivers)

Vulnerability Yes No N/A Detail

Is a log of non-employees entering the establishment maintained?

Is a method to recongize or identify non-employees in the establishment in place?

Are non-employees chaperoned on site?

Are non-employees restricted to appropriate areas?

Are non-employees restricted on what they can bring in or take from the facility?

3.3 Security Training


Vulnerability Yes No N/A Detail

Is awareness training on security measures provided to new employees?

Is a refresher awareness training on security measures offered to employees on a


periodic basis?

Are employees trained to report suspicious activities or unusual observations?

Section 4 Incident Response Measures

Goal: To respond quickly to a product contamination threat or event using planned members

4.1 Investigating Security Concerns

Vulnerability Yes No N/A Detail

Do you have procedures to ensure that adulterated or potentially harmed products


are held?

Are customer comments investigated?

Are members encouraged to report unusual activities?

Is information available to employees about how to respond to threats?

Do employees have the ability to stop activities in order to minimize a potential food
defense incident?

Are reported security breaches (alarms, suspicion of tampering) investigated?


4.2 Emergency Contact Security

Vulnerability Yes No N/A Detail

Is employee/member contact information kept up to date?

Are emergency contact lists kept up to date?

4.3 Other Plant Security

Vulnerability Yes No N/A Detail

Is a product recall plan maintained and periodically reviewed?

Is key personnel trained in product recall procedures?


Vulnerability Mitigation Strategy

Vulnerability Mitigation Strategy

Status Response Monitoring Corrective Action Verification

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy