FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

Similar documents
C-TPAT Partner Application for Importers Instructions

C-TPAT Minimum Security Criteria

Importers: C-TPAT Minimum Security Requirements

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

Foreign Manufacturer Eligibility Requirements

Xerox Supplier Security Requirements

C-TPAT Security Questionnaire PASS FAIL 1

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

C-TPAT Minimum Security Requirements Importers

Air Carrier Eligibility Requirements

Food Defense Supplier Guidelines

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Rail Carrier Minimum-Security Criteria

Please complete the questionnaire and fax it to

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

TEXAS LOTTERY COMMISSION

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Standards. Importers

C-TPAT Information for Foreign Manufacturers & Suppliers

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

Supply Chain Questionnaire Business Partners

A Message for Brokers Letter And Security Guidelines for Brokers

Guidance Notes FSR 2014

Milestone AV Technologies TECHNICAL SPECIFICATION

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

Physical Security Assessment Form

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Foreign Factory Profile

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

CTPAT Security Requirements for Import Suppliers

Food Safety Identity Preserved Quality Management System Standard

Food Defense Plan Exe x r e ci c se s s

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS

C-TPAT Questionnaire. Type of Partner

Pakistan Supply Chain Security (PSCS) Code

Template Document for the Interim Final Rule 33 CFR

Guidance for Airport Operators Designating Known Suppliers of Airport Supplies

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.

C-TPAT Expectations for

Farm Security Checklist

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

GUIDANCE FOR INDUSTRY IMPORTERS AND FILERS: FOOD SECURITY PREVENTIVE MEASURES GUIDANCE

CREATING YOUR SCHOOL FOOD DEFENSE PLAN

Preparing an Emergency Response Plan (ERP)

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

FSIS Safety and Security Guidelines for the Transportation and Distribution of Meat, Poultry, and Egg Products

AM Retail Group, Inc. C-TPAT EVALUATION

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC

STUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

SECTION 1: TRADER INFORMATION

EASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

Protect Your Elections

Multiple Sites. Tomorrow s Technology

Supplier Security Directives

Security Innovations to Adapt to Emerging Threats

Supply Chain Security Guidelines

Protecting Your Swipe Devices from Illegal Tampering. Point of Sale Device Protection. Physical Security

Hazardous Materials and Chemicals

2018 Parking Services Cash Handling Review 8/3/2018. P.O. BOX 1027, SAVANNAH, GA

C-TPAT Expectations for Agents, Vendors & Manufacturers

Global Security Verification Report

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Current as of 11/10/08 1 of 5

Sample Safety Checklist

American Well Hosting Operations Guide for AmWell Customers. Version 7.0

INTERNATIONAL CYANIDE MANAGEMENT INSTITUTE Cyanide Transportation Verification Protocol

Global Security Verification Report

Audits should be undertaken by an independent person either from within the company or an outside consultant.

T H O M A S M C D O N N E L L

McCain Foods Limited North American Customer Pickup Policy version 1.0

Point-Of-Sale Device Tampering Training COMPLIANCE MANAGEMENT FINANCIAL SERVICES EAST CAROLINA UNIVERSITY

CONTAINER SECURITY. For example:

Approval of Secure Destruction Facilities

IMPLEMENTING GUIDANCE FOR LICENSEES THAT POSSESS RADIOACTIVE MATERIAL QUANTITIES OF CONCERN

Smart Security CyCop Workforce Management Technology

FACILITY SECURITY PLAN (FSP) REVIEW CHECKLIST

Type II Inspection Worksheet

AAFCO Checklist for Best Management Practices Guidance Document for Manufacturing, Packaging and Distributing Animal Feeds and Feed Ingredients

Food Defense Assignment Due: Name:

Type II Inspection Worksheet

BMP AUDIT CHECKLIST GPS COORDINATES OF INSPECTED SITE: DATE OF INSPECTION: COMPANY NAME: PHYSICAL ADDRESS: MAILING ADDRESS: CITY: STATE: TEXAS

OFFICE OF THE TEXAS STATE CHEMIST AMMONIUM NITRATE SECURITY AND BMP AUDIT CHECKLIST

ECIA Distributor Counterfeit Product Mitigation Internal Audit Checklist

Transcription:

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES Copy No. Uncontrolled Canadian Grain Commission Process Verification and Accreditation Office Industry Services 900-303 Main Street Winnipeg, Manitoba Canada R3C 3G8 April 1, 2017 2017 Canadian Grain Commission Revision 1

Table of Contents Using this Checklist... 3 Determining Risk... 3 Physical Security of the Facility... 6 Access to the Facility... 7 Personnel Procedures... 9 Receiving and Shipping Procedures... 11 Food Defence Checklist 2 April 1, 2016

Food Defence Self-Assessment Checklist Grain Handling Facilities The first part of developing a Food Defence good operating practice is to perform a self-assessment of your current security and food defence practices. This selfassessment will help you determine which policies and practices you may already have in place to prevent intentional tampering, and as well, will serve as a guide to helping you implementing food defence good operating practices. This checklist is not an exhaustive list but is meant to be a guidance tool for assessing your facility s compliance to PPR-015 Food Defence. You may encounter critical areas or assets not covered in this checklist that are specific to your facility that may be at risk to tampering or intentional contamination. Likewise, you may also find that your facility has dealt with potential food defence risks in ways that are not suggested by this checklist. The best way to use this checklist is to compare the recommended practices to your facility s current practices, adding security measures where deficiencies are found and omitting recommendations that are not applicable to your facility or where other measures adequately cover the risk. Using this Checklist Each section focuses on an asset or process that may be at risk and lists a series of options that may be used to increase the security of that asset or process. Security options for each section may include, but are not limited to, one or a combination of any number of the options given. If no is selected for a security option, it is highly recommended that your facility consider implementing policies, procedures and infrastructure to enhance the security for that particular asset or process. There may be options that are not feasible for your facility or may be deemed excessive for your operation (e.g. installing fences around your facility, video surveillance cameras). If this occurs, then the following questions should be considered: 1. What is the risk to the asset or process if this security option is not implemented? 2. Are there other security measures implemented or that can be implemented that would mitigate any security breach of that asset or process? Determining Risk Determining whether an asset or process is at risk involves thinking about these assets and processes from the perspective of an attacker wanting to do harm. You want to identify the most attractive targets for attack and what points in your facility s infrastructure or operations are most vulnerable. Once you have Food Defence Checklist 3 April 1, 2016

Likelihood of Occurrence determined which assets or processes are most at risk, you can then focus resources on reducing the likelihood of security breaches within your facility. Using a risk assessment model, such as the CFIA model shown in Figure 1, may help to assess the significance of a food defence breach. This may help you to decide where resources are best allocated for your facility s food defence plan. If you answer no to any of the questions in the checklist, you should consider: How likely is it that an attack could occur without this measure in place? How severe are the consequences if there was an attack? The likelihood of occurrence as depicted on the vertical axis (Figure 1) refers to the chance that an attack may occur. The likelihood of a breach in security increases as control over assets and processes decreases. The severity of the consequences as depicted on the horizontal axis (Figure 1) refers to the impact that intentional taint or tampering will have on human health. The severity of consequences is broken down into one of 3 categories: Low no medical attention required Medium medical attention required, but full recovery of consumer expected High medical attention required, no chance of recovery of the consumer To determine the risk of tampering or intentional taint, combine the results of the likelihood of occurrence with the severity of the consequences. The outcomes vary based on the likelihood that tampering or intentional taint will occur and the severity of the consequences. High A Mi Ma C medium A Mi Ma Ma low A Mi Mi Mi remote A A A A low medium high Severity of Consequences Food Defence Checklist 4 April 1, 2016

There are four levels of risk in this model: Acceptable (A) a very small possibility of risk Minor (Mi) a low level of risk Major (Ma) a moderate level of risk Critical (C) a high level of risk Depending on the outcome of your risk assessment, you may need to evaluate whether or not another security measure will mitigate this risk or if additional security measures are required. It is impossible to eliminate all risk, but you must be able to ensure that risk is reduced to an acceptable level. When completing this checklist, conduct the risk analysis for each section to which you answered no and then document your justification for your risk mitigation action. It may be as simple as having another security measure in place that will protect the process or asset. If you find that a process or asset is not adequately addressed, other security measures may need to be implemented. Food Defence Checklist 5 April 1, 2016

Physical Security of the Facility Required outcome: physical barriers and deterrents are installed to deter intruders and prevent access to the facility Assessment: What type of physical security measures does your facility have to prevent unauthorized access to the critical areas or assets of your operation? Yes No N/A Unattended entry points (doors, windows, ventilation system access) to the facility are secured with locks, seals or sensors Security lighting in high risk or dimly lit areas Motion activated lighting in high risk areas Motion detection devices and alarms that are monitored by an offsite security company or contractor Video surveillance equipment in high risk areas Surveillance patrols by a contracted security firm Perimeter fencing around the facility with locked gates Risk analysis and mitigation: Food Defence Checklist 6 April 1, 2016

Access to the Facility Required outcome: access to assets or processes that are at risk for tampering or taint is restricted for unauthorized persons Assessment: What type of operational security measures does your facility have to prevent unauthorized access to the critical areas or assets of your operation? Yes No N/A Designating sensitive or high risk areas of the facility as restricted areas (e.g. chemical storage, utility system access, areas used to store sensitive information) and controlling access to these areas Maintaining employee shift schedules to ensure that supervisors know which employees to expect on-site Limiting employee access to critical areas or assets of a facility based on employee job function Designating specific areas for parking, keeping staff parking separate from visitor parking Requiring all visitors, contractors and vendors to sign in with a designated company representative upon arrival Requiring all visitors, vendors and contractors to be accompanied while on the premises Risk analysis and mitigation: Food Defence Checklist 7 April 1, 2016

Assessment: How is the grain handling process flow secured in your facility? Yes No Preoperational assessment of the premises and equipment is conducted to inspect for signs of tampering, vandalism or breach of security Exterior ladders are locked/access is restricted Receiving pit is covered and secured when not in use (e.g. after hours) Grain discharge spouts are secured when not in use Storage bins and containers are secured when not in use Doors to maintenance and tool sheds and chemical storage areas are secured Access to the facility s control room is restricted Access to the facility s power supply (e.g. electrical panels, generators) is restricted Computer-generated information is safeguarded; information is password-protected; anti-virus software is installed and updated; and saved data is backed up and stored off-site Inventory records of all grain and non-grain inputs are kept current Physical records (documents, scale tickets, bills of lading etc.) are stored in a secured, locked area Restrict access to company keys and/or limit access to authorized personnel only N/A Risk analysis and mitigation: Food Defence Checklist 8 April 1, 2016

Personnel Procedures Required outcome: procedures are in place to ensure that employees of the facility are unlikely to pose a food defence risk to the facility or its operations Assessment: Does your facility have food defence personnel procedures in place? Yes No N/A Resumés are requested from applicants; qualifications are screened; and multiple references are contacted Short-term and seasonal employees are restricted from accessing critical assets or areas Work assignment schedules are developed and maintained Employees are trained in food defence and security policies and procedures, including whom to contact in case of emergency, which areas of the operation are high risk and where the shut-off points are for utilities. Training is conducted on a regular basis for new employees and as a refresher for existing employees Employees are trained to report suspicious activities or behaviours, misplaced equipment or suspicious materials or devices Supervisors and management are trained to be alert for atypical illness or health conditions among employees When employees are terminated or resign, all employee identification, facility keys, access cards, cell phones and other company electronic devices are returned When employees are terminated or resign, all access to information (e.g. computer log-in and email accounts) is suspended When employees are terminated or resign, company records are updated to reflect this change in authorization and customer contacts are notified in the change in authorization Contractors performing work on site are briefed on the facility s security rules and what areas of the plant they are allowed to access Truck drivers delivering grain and non-grain inputs are restricted to receiving areas only The entry of employees into the facility during non-working hours is restricted to authorized personnel only Employees and contractors are prohibited from bringing personal items not required for job performance into the grain handling area Food Defence Checklist 9 April 1, 2016

Risk analysis and mitigation: Food Defence Checklist 10 April 1, 2016

Receiving and Shipping Procedures Required outcome: inbound and outbound grain and non-grain inputs are not potential targets for taint or intentional contamination Assessment: what procedures does your facility have in place to ensure the security of the receiving and shipping operations? Yes No The company has a supplier approval program for purchasing non-grain inputs The company has a producer approval program in place for purchasing grain Grain is inspected upon receipt for evidence of taint or tampering Non-grain inputs are inspected upon receipt for evidence of taint or tampering The receiving area, including the pit, is inspected as part of the facility s start-up procedures Transport affidavits are required before incoming grain is received at the elevator Transport conveyances (railcars, containers, trucks) are inspected before grain is loaded for shipping Outgoing shipments are sealed with tamper-evident seals and the seal number is documented on the outgoing shipping documents Access to receiving areas and loading docks are monitored Unfit and contaminated goods are segregated in a way that minimizes the likelihood of compromising other goods Security measures and procedures are in place at all off-site and public warehousing locations N/A Risk analysis and mitigation: Food Defence Checklist 11 April 1, 2016