Background

This authenticity comes from:

  • Industry associations.
  • Government agencies.
  • And private information sources such as QAssurance. 

abuses are reported via, among others:

  • www.vmt.nl
  • wetgeving.qassurance.com
  • www.nvwa.nl
  • the Rapid Alerts (RASFF)
  • Rapid Alert and Feed Qray (app)
  • the food safety news brief.

A vulnerability assessment is executed on the basis of this information, on all groups of foodstuff raw in order to assess the risk of counterfeiting or substituting. This takes into account: 

  • Historical evidence of counterfeiting or substitution;
  • Economic factors that make counterfeiting or substitution attractive;
  • Accessibility to raw materials through the supply chain; 
  • Refinement of routine testing to identify counterfeit resources;
  • Nature of the raw material.

This vulnerability assessment is formally assessed at least annually in order to take into account and process modified economic conditions and market information that could change the possible

If raw materials are identified in this vulnerability assessment as being at special risk of counterfeiting or substitution, appropriate warranty and / or testing processes will be put into place to reduce the risk. 

If are labelled or there are claims made on the end packaging that depend on the status of the raw material, such as:

  • Specific origin or source;
  • Breed / varieties claims;
  • Status of assurance (for , GAP);
  • Genetically modified organism status (GMO);
  • Identity retention;
  • Specific name trademark ingredients.

then the status of each batch of raw material will be checked.

As an , we record , of use of raw materials and end product packaging with claims. As an organization we are obligated to frequently perform a documented mass balance test with regard to claims. This is carried out and recorded at least every 6 months (in case of the absence of a system certificate) that guarantees product authenticity.

For claims related to the methods of (for example , Beter Leven, , kosher), we as an organization must have the necessary to be able to make this

The process flow for the product of products with a claim is documented and possible areas for or loss of identity identified. Appropriate controls are established to ensure product integrity. 

Associated files

Food Vulnerability Assessment.

TwitterFacebookLinkedInPin It

Related articles to Product authenticity, claims and chain assurance

Many customers and visitors to this page 'Product authenticity, claims and chain assurance' also viewed the articles and manuals listed below:

We are a Food Tech firm in Food Safety Compliance. Experts in setting up and maintaining Food Safety Systems for companies in the Food Supply Chain. We are dedicated to breaking down the barriers for Transparency and Trust in the Global Food Supply Chain.
In our Partnership Program we would like to work together with (Non)Governmental Organizations, Universities, Multinationals and Food companies.

iMIS Food is a fully equipped Food Safety Compliance platform. Unique is the installation of an iMIS Food server at the Food company, for online and offline availability. The online (no travel costs) iMIS Food implementation process includes 6 to 10 days of support and has a lead time of 3 months.


Monthly iMIS Food Update

Would you also like to receive the monthly iMIS Food Update and be invited to our events? Then please fill in this form.

Food Safety news 7-2024

Bioeconomy: transforming the agrifood systems

Hereby a summary of the sustainable and circular bioeconomy in the climate agenda and opportunities to transform agrifood systems written by the FAO.

Did the QA manager change into a QA issue manager?

The following article describes, the term QA manager and argues whether the qa manager is increasingly becoming a QA issue manager who solves issues all the time.

The Future of sustainable protein in Asia-Pacific

Read here a summary of the article by the World Economic Forum on the future of sustainable protein in the APAC region. Three experts share their views.