COMBINE YOUR HACCP AND HARPC PLAN STEP-BY-STEP…

The use of HACCP principles is driven by local law, customer requirements and also by standards, such as Global Food Safety Initiative (GFSI) recognised schemes. These drivers mean that; even with the introduction of the preventive control rule and therefore HARPC, the need for a HACCP based system also remains.  Food facilities will continue to be requested by law, by their customers and by the certification standards that they adhere to, to comply with HACCP principles.
Therefore, there is a need for a combined HACCP and HARPC approach, one which takes into account the requirements for both standards.  This book provides one cohesive methodology, laid out in a logical manner, step-by-step…
vulnerability assessment publications

ASSESSING ERROR VULNERABILITY FOR FOOD INTEGRITY

The issue of food integrity is one of the legal and moral obligations to the consumer and is becoming increasingly important to brand protection within the food industry.  As a result, integrity is becoming a more common requirement of the retailer standards.  Until now, there has not been a clear way of assessing the risks and implementing the required controls. Building on the success of our pioneering threat vulnerability methodology that is becoming widely applauded by those implementing it and reviewing it, we’ve now developed a method to assess integrity…
vulnerability assessment publications

OUR BEST SELLING… ASSESSING THREAT VULNERABILITY FOR FOOD DEFENCE

EDITION 2

The issue of food defence is becoming increasingly important within the food industry.  The need for a systematic approach to identify and manage threat and vulnerability is accelerating and is becoming incorporated into industry standards.  Now that GFSI have included food fraud in their benchmarking requirements, all GFSI standards now need to include food fraud.  Edition 2 of this pioneering book, incorporates GFSI requirements and restructures the book to reflect the supply chain; starting with raw materials and then progressing onto threats within the product supply chain.  The 2nd Edition builds on the methodolgy in the First Edition, which now takes into consideration the likelihood of detection.