Biosecurity Flashcards

1
Q

is it easy to track food adulteration?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

give some examples of food adulteration

A

Adding an ingredient of lesser value (melamine in milk)

Adding colour or flavor to mask a defect

Using a species of lesser value (cow milk used to dilute goat milk, horse meat instead of cow meat)

Using an ingredient from an “off-label” geographic location (i.e. using Asian oysters, but selling the oysters as Canadian oysters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is food security?

A

Food Security is defined as access to sufficient calories on a daily basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why food safety is a food security issue

A

Food safety is a food security issue since contaminated food cannot be eaten and may threaten the food supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is food bioterrorism; give one example

A

Food bioterrorism is intentional contamination of food for economic gains or to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To prevent biological contamination of concern for food, what system is used

A

hazard analysis critical control point (HACCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two ways foodborne illness can originate

A
  • Failure of control systems (like HACCP, and then as in lecture about foodborne pathogens)
  • Or intentional contamination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the biggest bioattatack in US?

A

Food brone, when someone sprayed a cocktail of Salmonella in a food buffet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why it is difficult to assess of interventional for intentional food contamination are good or bad?

A

It is difficult to assess if interventions are successful at minimizing risk of intentional contamination without demonstrating a failed attack

The chance of an attack is exceedingly low, and therefore, stakeholders are understandably reluctant to invest resources to protecting against such events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to somewhat assess the degree to which the intervention reduces vulnerability?

A

•Therefore, now the approach is to evaluate the degree to which the intervention reduces the vulnerability of each system within the overall food supply infrastructure:

  1. Analyze the vulnerability of an operation within the food system
  2. Deploy an intervention
  3. Analyze the vulnerability again
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does the approach of evaluating each individual component is economically justified?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

•There are two sets of risk management tools to help with individual component vulnerability:

A
  • Operational Risk Management (ORM)
  • Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability (CARVER)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ORM

A

•ORM is loosely defined as a function of the severity of the failure and the probability of the failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Five steps in ORM

A
  1. Identify the hazards
  2. Assess the potential consequences of the hazards
  3. Determine which risks to manage with which interventions
  4. Implement the interventions
  5. Assess the success of the interventions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is severity and probability is evaluated on the same scale in ORM

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Scales for probability and severity in ORM: make an assessment for the salad and salmonella case

A

Probability: very high

Severity: medium

16
Q

What do you do after ORM probability and severity was assessed

A

•Through a simple charting exercise, a team can evaluate each of the vulnerabilities and then rank them in terms of greatest risk if a catastrophic event were to occur

Then reassessment happens

17
Q

Successful utilization of OMR (does/ does not) require that sensitive details on potential agents be discussed

A

•Only general characteristics need to be known, i.e. how much of a contaminant could be added to a product, and if there are potential mitigation steps downstream such as thermal treatments or filtration

18
Q

• is a process used to evaluate the vulnerability of a food operation system by evaluating each node within the system

Name

A

Carver shock

19
Q

7 elements of CARVER+shock and explain them

A
20
Q

in terms of priority what type of nodes CARVER+shock can have

A

High and low risk

21
Q

What is the second step in CARVER+Shock system

A

•The second step is to evaluate the food facility and identify unique nodes, and each node when taken in total should represent the entire production system

22
Q

It is a lot of work to identify key steps or nodes for intervention when assessing a processing pathway: is there a way to help?

A

•The FDA and HC prepare specific guidance documents to help food processing facilities protect against specific microbiological (and chemical) agents

23
Q

Can an agent that is danger in one case can be a not dangerous in another?

A
24
Q

•___an approach for evaluating detection and diagnostic system intervention options. What approach, basis

A