14 Zfi SP 031 Food Defence Program
14 Zfi SP 031 Food Defence Program
14 Zfi SP 031 Food Defence Program
SCOPE:
The procedure is applied to all facilities of Zaiqa Food Industries.
RESPONSIBILITIES:
Factory Manager and QA Manager are responsible to review the program on annual
basis in order to check its effectiveness and update the program accordingly.
Floor Incharge / Supervisors are responsible to follow the instructions for visitors
entry in production facility.
Security Guard is responsible to make sure that all necessary details are taken from
visitors and properly recorded in visitors register.
PROCEDURE:
This food defense plan is organized in four sections:
1.
2.
3.
4.
Page 1 of 5
1.1
Physical Security
i. Plant boundaries are kept clear and secured to prevent unauthorized entry.
ii. Entrances are secure.
iii. Plant perimeter is periodically monitored for suspicious activity.
iv. Outside lighting is present to deter unauthorized activities
v. Other access points such as windows and vents are secured.
vi. Outside storage on the premises is protected from unauthorized access
1.2
Shipping/Receiving Security
i.
ii. Incoming and outgoing vehicles are examined for suspicious activity
iii. Loading and unloading activities are scheduled and monitored
iv. Loading area access is controlled and loading is only allowed from dispatch
area gate.
v. Incoming shipments are secured and monitored and unloading is allowed
only from designated points.
vi. Outgoing shipments are locked / sealed
1.3
i.
Mail is handled away from food including ingredients and packaged food product.
ii.
Employees who handle mail are aware of proper handling of suspicious mail.
2.1
Page 2 of 5
2.2
2.3
Storage Security
2.4
Ingredients/Water
i. Restrict access to storage tanks for potable water and to water reuse
systems.
ii. Access to lines that transfer water and ingredients are examined and
restricted
iii. Restricted ingredients (for example allergens, preservatives) are controlled
iv. Supplier food safety/security information is requested
2.5
Page 3 of 5
2.6
Information Security
i. Access to sensitive information such as site plans and processing details is
controlled
ii. Access to computer systems is protected through passwords
3.1
Employee Security
3.2
3.3
Security Training
4.1
Page 4 of 5
i.
are held.
ii. Customer comments are investigated
iii. Reporting unusual activities is encouraged
iv. Information is available to employees on how to respond to phone or other
threats
v. Employees have the ability to stop activities to minimize a potential
food defense incident
vi. Reported security breaches are investigated
Page 5 of 5
Approved By: