Anda di halaman 1dari 4

Food Defense Self-Assessment

Mark each item either: Y (Yes), N (No), N/A (Not Applicable) or DNK (Do Not know) Investigation of Suspicious Activity
Management Y N N/A DNK
Y N N/A DNK ☐ ☐ ☐ ☐ Investigate threats or information about signs of
☐ ☐ ☐ ☐ Prepare for the possibility of tampering or other tampering or other malicious, criminal or
malicious, criminal or terrorist actions terrorist actions
☐ ☐ ☐ ☐ Assign responsibility for security to ☐ ☐ ☐ ☐ Alert appropriate law enforcement and public
knowledgeable individual(s) health authorities about any threats of or
☐ ☐ ☐ ☐ Conduct an initial assessment of food security suspected tampering or other malicious,
procedures and operations criminal or terrorist actions
☐ ☐ ☐ ☐ Have a security management strategy to
prepare for and respond to tampering and other Evaluation Program
malicious, criminal or terrorist actions, both
threats and actual events, including identifying, ☐ ☐ ☐ ☐ Evaluate the lessons learned from past
segregating and securing affected product tampering or other malicious, criminal or
☐ ☐ ☐ ☐ Plan for emergency evacuation, including terrorist actions and threats
preventing security breaches during evacuation ☐ ☐ ☐ ☐ Review and verify, at least annually, the
☐ ☐ ☐ ☐ Maintain any floor or flow plan in a secure, off- effectiveness of the security management
site location program, revise the program accordingly
☐ ☐ ☐ ☐ Become familiar with the emergency response ☐ ☐ ☐ ☐ Perform random food security inspections of all
system in the community appropriate areas of the facility (including
☐ ☐ ☐ ☐ Make management aware of 24-hour contact receiving and warehousing, where applicable)
information for local, state and federal using knowledgeable in-house or third party
police/fire/rescue/health/homeland security staff
agencies ☐ ☐ ☐ ☐ Verify that security contractors are doing an
☐ ☐ ☐ ☐ Make staff aware of who in management they appropriate job, when applicable
should alert about potential security problems
(24-hour contacts) Human Element - Staff
☐ ☐ ☐ ☐ Promote food security awareness to encourage
all staff to be alert to any signs of tampering or Screening (Pre-Hiring, At Hiring, Post Hiring)
other malicious, criminal or terrorist actions or
areas that may be vulnerable to such actions, ☐ ☐ ☐ ☐ Examine the background of all staff as
and reporting any findings to identified appropriate to their position, considering
management candidates’ access to sensitive areas of the
☐ ☐ ☐ ☐ Have an internal communication system to facility and the degree to which they will be
inform and update staff about relevant security supervised
issues
☐ ☐ ☐ ☐ Have a strategy for communicating with the Daily Work Assignments
public
☐ ☐ ☐ ☐ Know who is and who should be on premises,
Supervision and where they should be located, for each shift
☐ ☐ ☐ ☐ Keep information updated
☐ ☐ ☐ ☐ Provide an appropriate level of supervision to all
staff, including cleaning and maintenance staff, Identification
contract workers, data entry and computer
support staff and especially new staff
☐ ☐ ☐ ☐ Establish a system of positive identification and
☐ ☐ ☐ ☐ Conduct routine security checks of the recognition that is appropriate to the nature of
premises, including automated manufacturing the workforce, then appropriate
lines, utilities and critical computer data
systems (at a frequency appropriate to the
☐ ☐ ☐ ☐ Collect the uniforms, name tag or identification
badge when a staff member is no longer
operation) for signs of tampering or malicious, associated with the establishment
criminal or terrorist actions or areas that may be
vulnerable to such actions Restricted Access

Recall Strategy
☐ ☐ ☐ ☐ Identify staff that require unlimited access to all
areas of the facility
Identify the person responsible and a backup
☐ ☐ ☐ ☐ person
Provide for proper handling & disposition of
☐ ☐ ☐ ☐ product
Identify customer contacts, addresses and Revised: 05.06.2013
☐ ☐ ☐ ☐ phone numbers Reviewed: 05.06.2013
the extent practical
Y N N/A DNK Y N N/A DNK
☐ ☐ ☐ ☐ Reassess levels of access for all staff periodically ☐ ☐ ☐ ☐ Restrict entry to the establishment
☐ ☐ ☐ ☐ Limit access to staff enter only to those areas ☐ ☐ ☐ ☐ Ensure that there is a valid reason for the visit
necessary for their job function and only during before providing access to the facility – beware
appropriate work hours of unsolicited visitors
☐ ☐ ☐ ☐ Change combinations, rekey locks and/or collect ☐ ☐ ☐ ☐ Verify the identity of unknown visitors
the retired key card when a staff member who ☐ ☐ ☐ ☐ Restrict access to food handling and storage
is in possession of these is no longer associated areas
with the establishment, and additionally as ☐ ☐ ☐ ☐ Restrict access to locker room
needed to maintain security
Facility
Personal Items
Physical Security
☐ ☐ ☐ ☐ Restrict the type of personal items allowed in
establishment
☐ ☐ ☐ ☐ Protect perimeter access with fencing or other
☐ ☐ ☐ ☐ Allow in the establishment only those personal deterrent, when appropriate
use medicines that are necessary for the health
of staff and ensure that these personal use ☐ ☐ ☐ ☐ Secure all doors, windows, roof
openings/hatches, vent openings, ventilation
medicine are properly labeled and stored away systems, utility rooms, ice manufacturing and
from food handling or storage areas storage rooms, loft areas, trailer bodies, tanker
☐ ☐ ☐ ☐ Prevent staff from bringing personal items into trucks, railcars and bulk storage tanks for
food handling or storage areas liquids, solids and compressed gases, to the
☐ ☐ ☐ ☐ Provide for regular inspection of contents of extent
staff lockers, bags, packages and vehicles when
on company property ☐ ☐ ☐ ☐ Use metal or metal-clad exterior doors to the
extent possible when the facility is no in
operation, except where visibility from public
Training in Food Security Procedures thoroughfares in an intended deterrent
☐ ☐ ☐ ☐ Minimize the number of entrances to restricted
☐ ☐ ☐ ☐ Incorporate food security awareness, including areas
information on how to prevent, detect and
respond to tampering or other malicious,
☐ ☐ ☐ ☐ Secure bulk unloading equipment when not in
use and inspect the equipment before use
criminal or terrorist actions or threats, into
training programs for staff, including seasonal,
☐ ☐ ☐ ☐ Account for all keys to establishment
temporary, contract and volunteer staff ☐ ☐ ☐ ☐ Monitor the security of the premises using
appropriate methods
☐ ☐ ☐ ☐ Provide periodic reminders of the importance of
security procedures ☐ ☐ ☐ ☐ Minimize, to the extent practical, places that
can be used to temporarily hide intentional
☐ ☐ ☐ ☐ Encourage staff participation in security
contaminants
procedures
☐ ☐ ☐ ☐ Provide adequate interior and exterior lighting,
Unusual Behavior including emergency lighting, where
appropriate, to facilitate detection of suspicious
or unusual activities
☐ ☐ ☐ ☐ Watch for unusual or suspicious behavior by
staff ☐ ☐ ☐ ☐ Implement a system of control vehicles
authorized to park on the premises
Staff Health ☐ ☐ ☐ ☐ Keep parking areas separated from entrances to
food storage and process areas and utilities,
where practical
☐ ☐ ☐ ☐ Be alert for atypical staff health conditions that
staff may voluntarily report and absences that
could be an early indicator of tampering or Storage and Use of Poisonous and Toxic Chemicals (For Example, Cleaning
other malicious, criminal or terrorist actions, and Sanitizing Agents, Pesticides)
and reporting such conditions to local health
authorities ☐ ☐ ☐ ☐ Limit poisonous and toxic chemicals in the
establishment to those that are required for the
Human Element – Public operation and maintenance of the facility and
those that are being held for sale
Visitors (Non-Employees) ☐ ☐ ☐ ☐ Store poisonous and toxic chemicals as far away
from food handling and storage areas as
practical
☐ ☐ ☐ ☐ Inspecting incoming and outgoing vehicles,
packages and briefcases for suspicious,
inappropriate or unusual items or activity, to Y N N/A DNK

Revised: 05.06.2013
Reviewed: 05.06.2013
☐ ☐ ☐ ☐ Limit access to and secure storage areas for Y N N/A DNK
poisonous and toxic chemicals that are not ☐ ☐ ☐ ☐ Evaluate the utility of testing incoming
being held for sale ingredients, compressed gas, packaging, labels,
☐ ☐ ☐ ☐ Ensure that poisonous and toxic chemicals are product returns and materials for research and
properly labeled development for detecting tampering or other
☐ ☐ ☐ ☐ Use pesticides in accordance with the Federal malicious, criminal or terrorist actions
Insecticide, Fungicide and Rodenticide Act ☐ ☐ ☐ ☐ Reject suspect food
☐ ☐ ☐ ☐ Know what poisonous and toxic chemicals ☐ ☐ ☐ ☐ Alert appropriate law enforcement and public
should be on the premises and keep track of health authorities about evidence of tampering,
them “counterfeiting” or other malicious, criminal or
☐ ☐ ☐ ☐ Investigate missing stock or other irregularities terrorist actions
outside a normal range of variation and alert
appropriate law enforcement and public health Storage
authorities about unresolved problems, when
appropriate ☐ ☐ ☐ ☐ Have a system for receiving, storing and
handling distressed, damaged, returned and
Operations rework products that minimizes their potential
for being compromised or to compromise the
Incoming Materials and Contract Operations security of other products
☐ ☐ ☐ ☐ Keep track of incoming materials and materials
☐ ☐ ☐ ☐ Use only known, appropriate licensed or in use, including ingredients, compressed gas,
permitted (where applicable) contract packaging, labels, salvage products, rework
manufacturing and packaging operators and products and product returns
sources for all incoming materials, including ☐ ☐ ☐ ☐ Investigate missing or extra stock or other
ingredients, compressed gas, packaging, labels irregularities outside a normal range of
and materials for research and development variability and report unresolved problems to
☐ ☐ ☐ ☐ Take reasonable steps to ensure that suppliers, appropriate law enforcement and public health
contract operators and transporters practice authorities, when appropriate
appropriate food security measures
☐ ☐ ☐ ☐ Store product labels in a secure location and
☐ ☐ ☐ ☐ Authenticate labeling and packaging destroy outdated or discarded product labels
configuration and product coding/expiration ☐ ☐ ☐ ☐ Minimize reuse of containers, shipping
dating systems (where applicable) for incoming packages, cartons, etc., where practical
materials in advance of receipt of shipment,
especially for new products Finished Product
☐ ☐ ☐ ☐ Request locked and/or sealed
vehicles/containers/railcars, and, if sealed,
☐ ☐ ☐ ☐ Ensure that public storage warehouse and
obtain the seal number from the supplier and shipping operations (vehicles and vessels)
verify upon receipt, making arrangements to practice appropriate security measures
maintain the chain of custody when a seal is ☐ ☐ ☐ ☐ Perform random inspection of storage facilities,
broken for inspection by a government agency vehicles and vessels
or as a result of multiple deliveries ☐ ☐ ☐ ☐ Evaluate the utility of finished product testing
☐ ☐ ☐ ☐ Request that the transporter have the capability for detecting tampering or other malicious,
to verify the location of the load at any time, criminal or terrorist actions
when practical ☐ ☐ ☐ ☐ Request locked and/or sealed
☐ ☐ ☐ ☐ Establish delivery schedules, not accepting vehicles/containers/railcars and provide the seal
unexplained, unscheduled deliveries or drivers, number to the consignee
and investigate delayed or missing shipments
☐ ☐ ☐ ☐ Request that the transporter have the capability
☐ ☐ ☐ ☐ Supervise off-loading of incoming materials, to verify the location of the load at any time
including off hour deliveries ☐ ☐ ☐ ☐ Establish scheduled pickups, and not accepting
☐ ☐ ☐ ☐ Reconcile the product and amount received unexplained, unscheduled pickups
with the product and amount ordered and the ☐ ☐ ☐ ☐ Keep track of finished products
product and amount listed on the invoice and
shipping documents, taking into account any ☐ ☐ ☐ ☐ Investigate missing or extra stock or other
irregularities outside a normal range of variation
sampling performed prior to receipt
and alerting appropriate law enforcement and
☐ ☐ ☐ ☐ Investigate shipping documents with suspicious
public health authorities about unresolved
alterations
problems, when appropriate
☐ ☐ ☐ ☐ Inspect incoming materials, including
ingredients, compressed gas, packaging, labels,
product returns and materials for research and
development, for signs of tampering, Y N N/A DNK
contamination or damage or “counterfeiting,” ☐ ☐ ☐ ☐ Advise sales staff to be on lookout for
when appropriate counterfeit products and to alert management if

Revised: 05.06.2013
Reviewed: 05.06.2013
any problems are detected

Access to Computer Systems

☐ ☐ ☐ ☐ Restrict access to computer process control


systems and critical data systems to those with
appropriate clearance
☐ ☐ ☐ ☐ Eliminate computer access when a staff
member is no longer associated with the
establishment
☐ ☐ ☐ ☐ Establish a system of traceability of computer
transactions
☐ ☐ ☐ ☐ Review the adequacy of virus protection
systems and procedures for backing up critical
computer based data systems
☐ ☐ ☐ ☐ Validate the computer security system

Food Defense Self-Assessment Completed By/Date:

Revised: 05.06.2013
Reviewed: 05.06.2013

Anda mungkin juga menyukai