Tag Archive for: Implementation

An Introduction to the basics of Food Irradiation

Did you know one of the more unique ways of preserving and guaranteeing safe quality food is by exposing it to radiation?

This is typically done through either gamma or x-ray’s, and if you were a comic book geek or just a laymen fan of the Avengers, you might immediately think of The Incredible Hulk and have concerns, but fear not dear reader! This is a safe processing method that can guarantee longer shelf life and sustainability for food.

In very simple terms, the treated food of choice is exposed to electron beams or ionized radiation which kill the germs on the food that could cause foodborne illness or poisoning.

This typically occurs once the food has been packed and is the final stage of the production process, occurring at a dedicated facility and before the product ships to the end customer.

Unlike other processes like pasteurization or canning, no heat is used, and as such, it can be considered a “cold” method of preservation.

If you are critically minded, you might be thinking right now, what are the benefits and drawbacks of this?

That’s a fair question, so let’s dive in:

How does food irradiation happen?

First and foremost, it’s important to stress that while food irradiation is safe and has large commercial benefits, it should never be used substitute for other Good Manufacturing Practices.

Irradiation occurs at the end of your practice and should be the final step in ensuring safe quality products – but never as the only means of preservation or food.

This means that the food manufactured has already followed all best practices that align with Codex Alimentarius or the dedicated standard of your choice, whether that be BRCGS, FSSC, Global GAP, SQF or any other GFSI or similar scheme.

Rather than reinvent the wheel, there’s a fantastic guide on the CDC website for this that is very accessible.

Typically packaged food like vegetables, meat, or spices are sent to a dedicated facility and passed through an irradiation chamber which bursts concentrated ionised radiation onto the food to destabilize its hydrogen bonds, which prevents DNA and RNA replication.

The food actually absorbs this radiation but once the treatment concludes, it quickly dissipates and leaves, causing no long term effect.

Once the food has been treated any free radicals that form are extremely reactive and so do not have a lasting presence.

It has no impact on non-living tissue and can also be used to slow down vegetable ripening due to the same factors.

Blog anchor food safety software oversight

Is it Safe?

Food irradiation is a common enough practice that is carried out in more than 60 countries over more than 500,000 tons of food products each year.

With the correct application, it is a safe practice that can enhance the robustness of a food safety system, but it should never be used to substitute for other Good Manufacturing Practices.

For example, should you spot rot or decay on produce, the item should be discarded.

While applying irradiation to it will prevent further decay, it will not negate the damage that has already been done.

As climate change and global supply chains increase in complexity, its place may become more common as it provides an additional guarantee that invasive insects or harmful species are not being shipped undetected in final products.

Although irradiation is a common practice, its commonality and application does vary from region to region.

In countries that have adopted the Codex Alimentarius in full, such as Pakistan and Brazil, there are no restrictions to its use, but the EU only allows herbs, spices, vegetable seasonings, cereals, raw milk, some bindings and shellfish to be used.

It should be noted, that even though there are restrictions currently, there is disagreement within the EU with some countries wishing to expand it to include the likes of chicken meat, egg whites, frog legs and crustaceans such as shrimp.

In these circumstance, some national agencies allow greater freedom to apply irradiation to food stuffs, but other countries can exercise their right to block their import.

It is important irradiated food is always clearly highlighted so consumers can make an informed opinion.

The Radura symbol

The Radura logo is an internationally recognised symbol that was introduced in the 1960’s that can be placed on all treated food products to show they have been exposed to irradiation.

The word itself is a portmanteau, combining the first half of “radiation” with “durus”, a Latin word meaning ‘hard’ or ‘lasting’.

Although there can be some variance in the logo, the shape and placement, is always the same.

It is a circle, with the top half noted by broken lines symbolising the radiation waves, with another full circle, or dot, in the middle and two leaves below it, symbolizing a plant.

The colour is always a shade of green, but this can vary from region to region, with the FDA version being a darker shade of green in the United States than the more bright, almost radioactive, shade that is used internationally.

Although the symbol is designed for international use and to be immediately recognised, it is not a mandatory symbol in many places and its usage depends not just on the regulation of the specific country or region, but can also be omitted due to public perception of what irradiation means.

Radura Symbol 4 2

What else can you do to make food safer?

As already stated, irradiation should only ever be applied following other GMP’s being conducted thoroughly.

It is one of many tools in the arsenal of a food safety practitioner that can be applied should they have the resources and inclination to do so.

Should they be constrained in these resources with time sinks or find they need assistance with other areas of their GMP’s, there are solutions that can help.

One of these solutions is ours, Safefood 360, which provides food manufacturers with comprehensives solutions for all things Food Safety and Supplier Quality Management.

With more than 35 modules covering everything from HACCP, Audits and Corrective Actions through to Monitoring production records and Supplier Pre-Assessments and yearly appraisals, we have everything you need to allow your team’s to focus on more value added activity.

Should you be interested in seeing how we can help your business, please click the button below and one of our team member’s will schedule a no obligation look at the system for you at a time of your convenience.

Demo request

Protecting Our Food: Effectively Tackling Food Fraud

Geo-political and “black swan” events in the last couple of years have re-emphasised how crucial it is for  the global food supply chain to be strengthened.

With the curtain now falling on a year of global elections, it remains to be seen how trade and policy will affect what and how we eat.

The massive uptick of Artificial Intelligence solutions has created a deluge of information overload to the point that roughly only about 30% of data in Enterprises is actually used.

Finally, and unfortunately, rising costs across manufacturing and delivery also mean we need to be more vigilant than ever against bad actors in the supply chain who are motivated by economic gain rather than moral concern to the end customer that what they produce is safe.

Where food fraud does occur, it can quickly undo a significant amount of good will for all good faith actors otherwise.

With fraudulent activities ranging from the misrepresentation of a product’s origin to the blatant substitution or imitation of the product itself, the impact is widespread, affecting everything from economic stability to wider public safety.

Addressing this issue requires a multi-faceted approach involving stringent regulations, advanced technologies, and collaborative efforts across the entire supply chain.

In this blog, we’ll explore the key challenges posed by food fraud, examine most common high-risk products, and highlight effective strategies to strengthen food supply integrity and restore consumer confidence in the products they purchase.Blog anchor food safety software oversight

Understanding the Threat of Food Fraud

Food fraud, as defined by the UK Food Standards Agency, involves “deliberately placing food on the market, for financial gain, with the intention of deceiving the consumer.”

Such practices can be harmful to consumers, who may be misled about the authenticity of food or animal feed, often at the risk of their health.

Factors such as intense and increasing cost-cutting pressures on suppliers and the potential for substantial profits have unfortunately resulted in food fraud becoming a more common practice.

Sometimes it can be as ‘innocuous’ as an ingredient being called something it’s not, such as “Manuka honey” from a different region or plant to where it is native, or outright replacement of ingredients such as saffron being substituted for turmeric or safflower.

In more severe cases, its practice can result in tragic outcomes.

Events such as the Melamine scandal or Horsegate highlight the need for rigorous monitoring and enforcement.

Food fraud typically occurs under the following scenarios:

  • Substitution or addition of materials to falsely enhance product value or cut production costs.
  • Dilution or misrepresentation of ingredients, creating misleading perceptions about quality or origin.
  • Misleading labelling or false claims about product attributes.

Certain products are subject to a higher risk of food fraud due to their economic value, production complexity, or susceptibility to adulteration.

Items like olive oil, fish, organic products, dairy, grains, honey, maple syrup, coffee, tea, spices, wine, and fruit juices are common targets.

Olive oil, for instance, often faces adulteration with cheaper oils due to its high market value, while the diversity of wine varieties makes it an easy target for dilution or counterfeiting.

As global food markets grow, ensuring the integrity of food products becomes increasingly vital, with consumer trust and health at stake.

SQF 15 5

Proactively Addressing Fraud

There are two keys things to consider for beginning to tackle fraud; these are 1) what can be done on a micro level (i.e., within your own supply chain), and 2) what can be done on a macro level (i.e., globally).

At a local site level, it is paramount to remember that for fraud detection and horizon scanning to be effective, it cannot be something static.

The dangers and threats in this area is constantly evolving and so a proactive approach that reflects reality and acceptance of this should be the norm.

In the same way that a HACCP or Food Defense plan would be updated following a process change, so should your TACCP and VACCP whenever there is a supplier or product change.

Active monitoring and threat detection from reputable sources such as EFSA or tools like Fera’s Horizon Scan should be considered.

The good news is that there are many active agencies and departments tackling this issue at regional levels which can support you while also cumulatively constituting a robust global framework, albeit one with some vulnerabilities.

In the United Kingdom, the National Food Crime Unit is a part of the Food Standards Agency which covers incidents within England, Wales and Northern Ireland, while working closely with the Scottish Food Crime and Incidents Unit.

With a mandate to address Food Crime, it specifically focuses on:

  • Adulteration
  • Substitution
  • Misrepresentation
  • Unlawful Processing
  • Waste Diversion
  • Document Fraud
  • Theft

While the FSA’s core responsibility is to safeguard public health in its area of remit, it does have handy tools and practices that can be applied no matter where you are based.

Speaking earlier this year at the BRCGS conference in London, one of the tools it advocates for detecting fraud is a handy mnemonic for categorising threats: F-O-O-D C-R-I-M-E-S.

These are areas where threats can occur and where we must be vigilant, and include:

  • Financial Incentives – What are the financial motivators for crime?
  • Opportunity – Does the actor in your supply chain have the opportunity to commit fraud? Where are these flashpoints and what can be done to minimise or remove them?
  • Organisation – Does the organisation have an anti-fraud culture? Is every employee trained to spot and flag any product issue with the organisation?
  • Documents – How are documents verified to guarantee the authenticity of products during the receiving process?
  • Concealment of True Origin – How are then the documents approved, used to verify the concealment of true origin?
  • Reputation – What do you know about the suppliers and traders that you are working with? Are they new to you? Have you carried out other checks prior working together and have you asked questions about them in your network?
  • Intent to Defraud – Was there any deliberate intent to deceive the outcome?
  • Market Drivers – What are the demand trends and trust factors for the sourced product? Are there peak periods when the product might face a higher risk of adulteration, and how could these factors impact your product? Additionally, how can horizon scanning help to prevent negative impacts on products?
  • Examples – How might external events impact your business, and would your current processes enable you to detect them? For example, with the war in Ukraine leading to higher tariffs on certain Russian products, is there a risk of misrepresenting the country of origin to bypass these tariffs? What best practices are in place to identify and manage such risks?
  • Smart – Are the current processes effective, and is the company actively evolving and enhancing best practices to prevent food crimes?

Considering the above will allow any business to gather and structure their intelligence, conduct thorough investigations, engage with their stakeholders to shore up weaknesses, implement more robust checks and processes, and internalise a more cohesive culture in their organisation that fosters continuous improvement.

SQF 20 1

What other proactive steps can you take to mitigate fraud?

Efforts from organisations like the NFCU play a crucial role in safeguarding the integrity of the food supply chain and protecting public health and consumer interests.

However, we cannot rely on these as a sole measure.

A guiding principle for everyone should be the WHO’s mantra of 2019 that “food safety is everyone’s business”.

If you are an actor or an agent involved in the creation, supply, manufacturing, distribution or service of food, you are responsible for its authenticity just as much as its safety.

In an age of big data and over whelming news cycles, it can be difficult knowing where to get started.

Depending on what part of the supply chain you are involved in, there are multiple options you can consider.

Applications such as Horizon Scanning, Process Analytical Software that uses Spectrometers or Chromatography, Genomics or DNA testing, or comprehensive Quality Management systems that combine Supplier Quality Management with features such as Statistical Analysis tools that can detect anomalies or link directly into Environmental instruments for real time monitoring and providence of data lineage.

We are proud that we offer a tool that helps address the last part of this picture.

Our robust solutions for Food Safety and Supplier Quality Management can assist you in building and instituting a culture of resilience and adaptability against food fraud and crime.

This means you can have peace of mind and ensure trust and confidence both internally with your staff and externally with your consumers, customers and stakeholders.

Preventing potential risks and identifying market vulnerabilities is crucial for businesses to avoid adverse scenarios that can impact brand image, deteriorate customers trust, and ultimately affect the overall company profitability.

Granular levels of control for risk and vulnerabilities assessments can enable a more effective strategy which entails cross-checking supplier risks and vulnerabilities with your own internal processes.

Regular score-carding and reviews of suppliers can help you proactively prepare contingency plans and maintain high standards for proactive future responses when black swan events occur.

If searching for a new vendor, having workflows that streamline pre-assessments can enable faster sourcing when a tried and trusted vendor is not able to deliver.

Obviously, and almost most importantly, this goes without saying, but all of the technologies, frameworks and processes in the world can amount to nought and not substitute for a poor culture.

Equipping your employees with knowledge about the various types of food fraud and how to recognise potential risks in their operations is paramount.

Initiatives like BRCGS’ Food Safety Culture Excellence train and engage, your customers and the results speak for themselves when staff are empowered to identify and report concerns proactively, preventing minor issues from escalating into significant problems.

Tackling fraud is not a simple issue nor is it one that we can rest on our laurels with.

To comprehensively address these risks we must be active, vigilant and continuous in our monitoring to ensure that production is safe for all.

It is abundantly clear that in order to do this while juggling the demands of modern life, technological solutions need to be implemented and can help mitigate some of this burden.

In at least the areas of Food Safety and Supplier Quality Management, we can play a small part in helping your business protect your operations and safeguard your brand equity and customer health.

To see how we can help you foster a continuous culture of resilience and create a more trustworthy food industry for everyone, please request a demonstration or click the button below for more information.

Demo request

How we ensure trust and security in our software platform

From horsegate to leafy greens, and covid to the Ever Given, the last decade has highlighted how complex and just-in-time supply chains have left us more vulnerable than ever.

In parallel, Moore’s law tells us that technology doubles every 18 months, meaning our exposure, and reliance, on digital solutions has become more dependent than ever.

In this rapidly evolving environment, data governance and its security are no longer an option, but a must-have, and honestly are now often more of a pre-requisite at the start of due diligence than the questions on quality management.

As companies rely more and more on cloud-based platforms to streamline operations, protecting sensitive information is more critical today than it ever was.

At Safefood, we are backed by the legacy of more than 180 years of LGC, our parent company, of providing tried and trusted solutions that underpin assurance and quality at all levels of food manufacturing and its supply chain.

Of course, we don’t rest on this legacy and take practical steps to ensure we honour this tradition in the face of evolving threats and disruption.

For us, ensuring data security goes beyond compliance. It’s also an opportunity to differentiate yourself from the competitors.

This blog is inspired by our recent e-book on platform security and takes a transparent look at the measures we deploy to protect your data security and provide you with confidence that you are operating to the best standards and practices.

Security and Compliance: Building Trust Through Proven Solutions

We understand that you have entrusted us with your data and the security of it is paramount.

When you outsource critical business operations you are placing a high degree of trust in the vendor’s ability to maintain, and often exceed, the standards that you provide to your own customers.

We value this trust and strive to deliver best-in-class solutions that safeguard and protect your data security, privacy and compliance practices.

To us, data security means more than just meeting standards; it’s about ensuring peace of mind, and we strive to demonstrate our commitment to this by ensuring we are audited and credentialed.

By adhering to SOC 2 (Type I and Type II) protocols, we offer rigorous security controls to protect customer data, giving you confidence in the safety and integrity of your information.

If needed, we can provide a full copy of our SOC2 report to your technical terms during your due diligence.

Adapting to Your Business’s Needs

The foundation of our platform is built on secure Microsoft .NET technologies and hosted within Microsoft Azure cloud, giving you an enterprise-class solution with enhanced performance, scalability and flexibility to scale as your business’ needs grow and evolve.

This means you need options to the platforms and hardware you can deploy.

To this end, our solution is browser-agnostic and compatible with all systems that have internet access.

So whether you operate Edge, Firefox, Chrome, Opera or something else across Windows, macOS, or Linux, you won’t have any issues logging in.

If you need to operate offline, we also offer dedicated mobile applications available in the Apple and Android stores that allow you to record and take audit data with you anywhere in the world and upload the results later at a time that’s convenient for you.

This ensures your data is always available and accessible, whether you are in the office, on-site, on the move, in a black-spot or even in the air.

A cynic reading this might think it sounds well and good, but this is all “inwards” looking to the platform – and in an age of hyperconnectivity, what about integrations?

Well ,the good news is that our platform integrates seamlessly with your broader IT ecosystem through advanced API support.

Our technical teams will assist your developers and ensure tight and seamless integrations using REST APIs.

Finally, running though out the software is StatusBI, our out of the box integration with leading Business Intelligence software to provide you reports that dive deep into your business data.

This data is held in data warehouses to optimize the reports performance and enables easy extraction for the use with your own enterprise Bl tools should you wish.

Blog anchor food safety software oversight

Data Ownership and Control: Your Data, Our Responsibility

You will always retain full ownership of your data.

Under GDPR, we are considered a data processor and we will serve as the conduit for your business needs. In line with this, nothing of your use is disclosed to third parties, except as required by law or as directed by you (such as using our Supplier Portal).

As part of our role, we only use data to provide you the best service and experience, such as troubleshooting, detecting, and repairing problems which might be affecting the operation of services, improving new features, and protecting you against emerging threats.

All data, both in transit and at rest, within our platform, is encrypted, utilizing industry-standard encryption protocols like AES265, TLS 1.2 or better encryption.

Nonetheless, to further strengthen security, Multi-Factor Authentication (MFA) through smartphone devices, email or SMS can be enabled at both the user or business levels.

Moreover, our data retention complies with numerous international codes for information security, including the E.U. Data Protection Directive (95/46/EC), the EU General Data Protection Regulation 2016/679, ISO/IEC 27001:2005 and with the requirements of FDA 21 CFR Part II and EU Annex II.

Finally, in the event that you need to leave the platform for any reason, following the off-boarding process, data is securely destroyed, ensuring your sensitive information does not persist in our systems longer than needed.Demo request

Fault Tolerance and Continuous Protection

Our platform is designed to be fault-tolerant and redundant, ensuring that operations continue semi-automatically even in the event of failure.

Redundancies are built into the infrastructure, enabling a quick recovery with minimal intervention and the platform is monitored 24/7 to ensure effective migration of data should it be needed.

Furthermore, regular penetration tests, vulnerability scans, and secure coding assessments using internationally recognized and accredited third-party security tools and specialists are constantly conducted.

If a catastrophic event was to occur with a data center, all instances are geo replicated and will be made available at a back up location and available to ensure you have continued use of the platform and do not experience any disruption.

How important is data security to you?

In today’s interconnected world, data security isn’t just about compliance or a regulatory checkbox – it’s a competitive and strategic advantage and a key driver of business resilience.

We are committed to delivering industry-leading security that not only protects your sensitive data but also strengthens your operational processes while ensuring compliance with the latest global privacy and regulatory standards.

By partnering with us, you’re not just choosing a platform – you’re investing in a solution that continuously evolves to meet emerging security challenges while safeguarding the future of your business.

If data security is your top priority and you’d like to explore how we provide comprehensive protection, we invite you to visit our Platform & Data Security webpage for a detailed overview of our robust security features.

Technology and Security Guide Safefood 360 page 0001