Upcoming Events
Prev MonthPrev Month Next MonthNext Month
Intentional Adulteration – Conducting Vulnerability Assessments Presented by Safe Food Resources
Tuesday, April 21, 2020, 8:00 AM - 5:00 PM CDT
Category: Industry Events

 presented by:
 
Register for Course  

This FDA Food Safety Modernization Act (FSMA) final rule is aimed at preventing intentional adulteration from acts intended to cause wide-scale harm to public health, including acts of terrorism targeting the food supply. Rather than targeting specific foods or hazards, this rule requires mitigation (risk-reducing) strategies for processes in certain registered food facilities. This course is taught by Lead Instructors trained by the FSPCA, who have been instructed in how to teach the FDA-recognized standardized curriculum.

Individuals who complete this course will receive a certificate from FSPCA which will be recognized by FDA for meeting the requirements of having a qualified individual responsible for conducting vulnerability assessments.

Attendees are strongly encouraged to take the FSPCA online Key Activity Types course before attending this course.  The KAT course can be found at KAT Online Course.

Register now for a small class size, student paced, fun learning experience!

 

WHAT SKILLS CAN STUDENTS EXPECT TO LEARN?

 

This course will teach attendees how to conduct vulnerability assessments using three key elements:

 

  • The severity and scale of the potential impact on public health.
  • The degree of physical access to the product.
  • The ability to successfully contaminate the product.

 

Attendees will also learn the hybrid approach to conducting vulnerability assessments which combines the KAT method with the three key element method as mentioned above.

WHO SHOULD ATTEND

  • QA Directors, Managers, Supervisors and Technicians
  • Operations Managers
  • Purchasing Managers
  • SQF Practitioners
  • All members of your Food Safety Team
  • Those who have responsibility for food defense and security

COURSE AGENDA

    1. An Overview of Food Defense Measures
    2. Vulnerability Assessment Preliminary Steps
    3. Considering Inherent Characteristics
    4. Considering an Inside Attacker
    5. Element 1: Evaluating Potential Public Health Impact
    6. Element 2: Evaluating the Degree of Physical Access to the Product
    7. Element 3: Evaluating the Ability of an Attacker to Successfully Contaminate the Product
    8. Analyzing Results to Identify Actionable Process Steps
    9. Applying the Hybrid Approach


LOCATION 

285 Forest Grove Drive, Suite 126
Pewaukee, WI 53072

FEE 

$550


Contact: Kelly Oberst | [email protected] | (262) 696-8290

THANKS TO OUR PREMIUM MEMBERS