SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
Combating The Impact of Product Counterfeiting:
   Defining the Growing Risk to Supply Chain
         Cost and Service Performance

             Omar Keith Helferich PhD


            September 23, 2010
Overview
• Source of Information and experience
• Review of Planning and Response during
  major disruption events
• Review of MSU National Center for Food
  Protection and Defense Research
• Recommendations to enhance Food Supply
  Protection

                © 2010 Michigan State University
Research and Industry Perspective

• Michigan State Anti-Counterfeiting and
  Product Protection Program (A-CAPPP)
• National Center for Food Protection and
  Defense (NCFPD)-Food and Pharmaceuticals
• National Environmental Health Association
• Industry Sustainability Assessment


                 © 2010 Michigan State University
Review: Counterfeit in Food Safety



       Discussion Scope

   Counterfeit/ Economic Fraud




                                                 Food Defense/
Food Safety
                                                 Bioterrorism


              © 2010 Michigan State University
Review: Counterfeit Actions
•   Adulterator
•   Tamperer
•   Thief
•   Over-runs/ Unauthorized Production
•   Diversion
•   Simulation or Look-a-likes
•   Counterfeiter

                   © 2010 Michigan State University
Review: Supply Chain Aspects of the Food Threat

• The international supply chain
   – Overview
   – Diversion
   – Transshipment
   – Free Trade Zones
• SCM countermeasures and deterrents
   – Integrated approach/ raise the stakes
   – Coordinated activities/ countermeasures
                    © 2010 Michigan State University
Review: Food Fraud Scale

• The global counterfeit food threat is estimated at $49
  billion, and the UK’s Food Standards Board (FSA)
  estimates the UK “level of fraud” around 10 percent.
  (Ravilious, 2006)




                       © 2010 Michigan State University
Review: Food Fraud Scope

•   Product Substitution
•   Product Up-labeling
•   Product Adulteration
•   Product Copy/ Unauthorized Refill
•   Product “Freshening”




                   © 2010 Michigan State University
Review: Counterfeit Countermeasures
•   Overt
•   Covert
•   Forensic
•   Track-and-Trace
•   Authentication
•   Investigation
•   Regulation
•   …Standard Operating Procedures
                  © 2010 Michigan State University
Research and Field Experience: Over 25 years
• Safety & Environmental Health                                      Ground Zero
engineering & research                                               WTC 2001
• Coordinating Logistics for
• Red Cross Logistics & Mass Care
Field Volunteer during major events
• MSU Food Security Research Team
for DHS -2005-07
• Research in sustainability &
disaster planning & recovery
• Co-Developed initial white paper on
supply chain security following WTC
2001                                          Issues:

                                Chaos after an Incident
                                     Public Health
                                   Secondary Events
                         Communications & Infrastructure Damage
                          Economic and Public Services Recovery
                                  © 2010 Michigan State University
Dimensions of SC Security: Incident Management Process(*)




                      3. Detection
                                                       4. Response
    2. Mitigation

                            Lessons
                            Learned
                                                           5. Recovery
1. Planning

 Supply Network Continuity Management Process
   *Comprehensive *Simple *Flexible *Tested
         *Revised for Changing Threats
         Minimizes Loss & Disruption
   * Drs. Helferich and Cook: 2002 CLM Research Results
                    © 2010 Michigan State University
Dimensions of Supply Chain Security:
                     Impact Matrix
Attribute        Scale                  Measure
Severity         Minor to Massive Lives, Injuries, Fear, Dollars, Performance

Duration -       Minutes to Years       Time
Impact
Geographical Local to Global            Square Miles and Boundaries

Detectability    Easy to Difficult      Warning Systems and Awareness

Frequency        Low to High            Historical vs. Concern

           Wind, Water, Disease, Fire, Explosion, Contamination, Radiation
                  Other SC Disruptions - Intentional/Unintentional

                               © 2010 Michigan State University
Dimensions of Supply Chain Security : Measures
•   Ability to detect security incidents
•   Reduction in the number of security incidents
•   Increased resilience in recovery
•   Changed risk profile –exposure vs. actual cost
•   Changed cost with continuity programs, insurance vs. shrink, injuries,
    downtime, turnover, temporary substitution
•   Improved security relative to competitors
•   Improved ability to meet security requirements
•   Relationships without recognition of potential risk vulnerabilities




                            © 2010 Michigan State University
Intentional and Accidental Food
 Contamination and Disease Outbreak Impacts
Year       Event                                                   Impact
1984       Salad bar contaminated by religious cult                751 ill
1989       Detection of cyanide in Chilean grapes                  $200 M
1996       Outbreak of BSE in UK cattle                            $5.8 B
1997       Outbreak of FMD in Taiwan pork                          3.85 M hogs
1999       Contamination of livestock feed with dioxin             $850 M
2001       Outbreak of FMD in UK cattle                            $8.32 B
2003       Exotic Newcastle disease in US poultry                  $180 M
After 03   Spinach, Beef, Pet food, Toothpaste, Seafood, etc.      $M to $B
Yearly     Losses due to 5 major food borne pathogens in US food   $6.9 B
           supply

                                © 2010 Michigan State University
Food Supply Vulnerability (*)
•   Planning completed to prepare and respond to intentional disruptions is also
    valuable for natural or accidental events.
•   The severity and impacts of the incident are dependent on the agent and scenario,
    ability to accomplish the event, and efficiency and effectiveness of detection and
    response.
•   Significant evidence has been found that indicates that agro terrorism is a target
    of terrorist groups.
•   World Health Organization urges “farm to fork” contingency planning due to the
    potential impact of attacks on national food supply sources. WHO states the
    following as examples, but expects it could be much worse depending on the
    agent used:
•   1985- 170,000 sick in the US from contaminated pasteurized milk
•   1991- 300,000 infected with Hepatitis A from clams sourced in China
•   1994- 224,000 infected with salmonella from ice cream in US


* Dept of Homeland Security: Areas of Vulnerability: People, Physical & Processes
                                © 2010 Michigan State University
Introduction and Dimensions
             of Supply Chain Security
• The application of policies, procedures, and
  technology to protect SC assets (product,
  facilities, equipment, information, and
  personnel) from theft, damage, or terrorism
  and to prevent the introduction of
  unauthorized contraband, people, or weapons
  of mass destruction.

  – Closs and McGarrell (2004)
                   © 2010 Michigan State University
MSU R&D Initiatives:
    DHS Supply Chain Security Benchmarking Objectives
•     Define Supply Chain Security
•     Identify status of supply chain security initiatives
•     Identify competencies and capabilities that firms are using to
      enhance supply chain security
•     Discuss benchmarking tool for improving supply chain
      security
This research was supported by the U.S. Department of Homeland Security (Grant number N-00014-04-1-0659), through a
grant awarded to the National Center for Food Protection and Defense at the University of Minnesota. Any opinions,
findings, conclusions, or recommendations expressed in this publication are those of the author (s) and do not represent
the policy or position of the Department of Homeland Security.




                                            © 2010 Michigan State University
MSU DHS Research Supply Chain Security
             Impact: A State of Transition
•   From                                    •      To
    –   Corporate security                         –      Cross functional team
    –   Theft prevention                           –      To include anti-terrorism
    –   Inside the company                         –      End-to-end supply chain
    –   Vertically integrated supply               –      Business model that includes 2nd
        chain with 1st tier suppliers                     and 3rd tier suppliers
    –   Country or geographic                      –      Global
    –   Contingency planning                       –      To include crisis management
    –   Reactive                                   –      Proactive




                                © 2010 Michigan State University
MSU Research Conclusions
•   Food supply chain firms are increasingly interested in protecting their
    supply chains to protect their customers and brand names.
•   Firms must develop a broad range of competencies to achieve supply
    chain protection.
•   Firms have seen performance improvements in detection and resiliency.
•   In general, firms embarking on supply chain security initiatives will, at
    least initially, increase firm and supply chain operating cost.
•   Better performance is linked to extended supply chain security efforts
    throughout the supply chain.




                            © 2010 Michigan State University
Where is Your Firm’s Security Program Opportunity?
Vital Segments               Priority     Tools/ Methods                  Improvement Tasks/COAs

1. Senior Management Input                Formalize Senior Mgt
                                          Council
2. Risk Assessment                        Define and Prioritize Risks

3. Benchmarking                            Formal Benchmarking-MSU

4. Facility Security Risk                 Utilize Formal Risk
Assessment                                Assessment- Carver Shock
5. Baseline Security-                     Top Priority Risks
Protection
6. Enhanced Security-                     CRT Process for Unique
Protection                                Incidents
7. Security Program Design                SC Cross Functional &
                                          Process Design
8. Plan and Process                       Independent Audits
Implementation
9. Process Monitoring &                   In Line Security Process with
Control                                   Balanced Scorecard Metrics
10. Process Review                        Ongoing Measurement &
                                          Learning

Accumulative                              Continuous Improvement

                                   © 2010 Michigan State University
Assessment of Food Vulnerability:
           CARVER Plus Shock
• Assessment method most commonly used
  and recommended by both USDA and FDA is
  the CARVER plus Shock.
• This tool can be used to assess vulnerabilities
  within a system or infrastructure. Conducting
  the assessment allows focus on the most
  vulnerable points that pose the greatest risk.


                   © 2010 Michigan State University
Assessment of Food Vulnerability:
            CARVER Plus Shock
• CARVER plus Shock is an acronym for seven attributes used to
  evaluate the attractiveness of a target for attack:
   – Criticality- measure of public & economic impacts
   – Accessibility-ability to access target
   – Recuperability- ability for system to recover
   – Vulnerability- ease of accomplishing the attack
   – Effect- amount of direct loss from attack
   – Recognizability- ease of identifying the target
   – Shock- combined measure of the physical, health,
     psychological and economic effects of attack
                        © 2010 Michigan State University
Summary of Key Learning's: Supply Chain &
                Security
•                                       .
    Need for a “Baseline Process” based on Risk
•   Recognition that Security is not a “Quick Fix”
•   Promoting that “Security is everyone’s responsibility
•   Supply Chain concerns, not only enterprise or functional specialties
•   Noticed/addressed based upon crises and failures, not successes
•   Only as robust as the weakest link
•   Weakened by poor communications and technology, personality and
    “turf” politics
•   Most successful when integrated into operations, not add-ons
•   Essential to business success with in-line process support of BU
•   In need of increased focus on Internal Access Control and Monitoring
•   In need of Increased focus on intentional incidents contaminations
•   Executive cross-functional security councils w/leveraged cross-functional
    leaders to drive agenda
                             © 2010 Michigan State University
Combating Counterfeiting &
     Adulteration Supply Chain Risk
                 Supply Chain Counterfeiting
                 GAPS & Opportunities                  Current &
                                                       Emerging
Best Practices                                         Guidelines,
                 Development of Prevention &
                 Mitigation Guidelines                 Checklists,
                                                       Standards
Risk Based
Analysis         Development of Supply Chain
                 Anti-Counterfeiting Internal          Proven
                 Standards                             Standards
                                                       Development
                                                       Processes
                 Recommended Process for
                 Standards Implementation &
                 Enforcement




                    © 2010 Michigan State University
Risk     and the   Response-based Business
                        Model
                   Response-based Business Model*


                             DISRUPTION EVENTS

                                     Natural
                                Criminal/Terrorist
                                  Public Health
Supply Network                                        Lean Inventory
                               Process/Equipment
 Rationalization                                       Management
                                Law / Regulations




                                    Globalization


           *Bowersox & Lahowchic, “Start Pulling Your Chain”
                   © 2010 Michigan State University
Dimensions of SC Security: Expectations-
                     A Changing Future

• Secure supply chains – containing advanced
  security processes and procedures
• Resilient supply chains – able to react to
  unexpected disruptions quickly in order to
  restore normal operations


 Rice and Caniato (2003), “Building a Secure and Resilient Supply Network,”
 Supply Chain Management Review, September/October.

                                         © 2010 Michigan State University
SC Protection: Potential Mitigation Programs
 Proactive
                                                                    Sustaining
Environment                                                         Excellence


                                                               Executive Commitment
                                                       Mitigation Pathway to Success Process
                                             Human Resource Backup- Cross Training
                                        Continuity Training & Education Process Redesign
                                 Mutual Aid Agreements                Supply Chain Network Design
                            Shared Committed Inventory              Critical Parts Inventory

  Reactive             Assets Backup         General Parts Catalog Increase Parts Inventory
Environment
              Collaborative Arrangements             Process Backup               Systems Backup
              Vision             Control                   Team                   Process

              Supply Chain Mitigation Initiatives: Physical, People, & Process


                                 © 2010 Michigan State University
Average Percent Improvement Reported by
                                                   Manufacturers from SCS Investments
                                     Efficiency                                                                                Visibility
          60
                                                                                             60
          50
                   48                                                                        50
                                                                                                       50
          40             43                     Reduced Inspections
                                                                                             40                                     Improved Asset Visibility
Percent




                                                Increased Automated Handling




                                                                                  Percent
          30                                                                                                                        More Timely Shipping Information
                               30    29         Less Process Deviation                       30
                                                                                                                 30

          20                                    Shorter Transit Time                                                                Reduced Inaccurate Shipping Data
                                                                                             20

          10                                                                                 10
                                                                                                                           9

                                                                                             0


                                     Resiliency                                              Inventory Management & Customer Relations
          35
                                                                                  40

          30        31                                                                            38
                                                                                                            37

          25
                                                     Shorter Problem
                                                                                  30
                                                     Resolution Time                                                                     Reduced Theft/Loss/Pilferage
                              23
          20
Percent




                                       21            Quicker Response to a                                            26                 Decreased Tampering
                                                                                   Percent


                                                     Problem                                                                            Less Customer Attrition
          15                                                                      20

                                                      Reduced Time to Identify                                                           Reduced Excess Inventory
          10                                         a Problem
                                                                                                                               14
                                                                                  10
          5

          0
                                                                                   0

               Source: Innovators in Supply Chain Security: Better Security Drives Business Value – Stanford University White Paper, June 2006

                                                                 © 2010 Michigan State University
Discussion and Feedback




          Thank You!

               SC Security ‘Brand
                Protection Pays’
Review: Packaging for Food and Product Protection
                          (P-FAPP) Initiative

•   The first step in the P-FAPP Product Protection Initiative is to create
    Teaching and Outreach Funding to develop university course content, to
    develop infrastructure, and to validate the long-term interest in the topic.

•   Teaching and Outreach Funding Deliverables:
     –   Undergraduate/ graduate Product Protection On-line Course – June 2008
     –   Executive education: Offer a Product Protection ‘short course’ – September 2008
     –   Certificate/ degree program: In development
     –   Continue the aggressive schedule of academic and industry presentations

•   For information please contact MSU/P-FAPP directly:
     – John Spink, Director, P-FAPP, 517.381.4491, SpinkJ@msu.edu
     –   http://foodsafe.msu.edu/Packaging_for_Food_and_Product_Protection_Initiative.html

•   Dr. Helferich may be reached at okeithhelferich@msn.com or
    info@supplychainsustainability.com
                                      © 2010 Michigan State University

Más contenido relacionado

La actualidad más candente

Pwc food-fraud-vulnerability-assessment
Pwc food-fraud-vulnerability-assessmentPwc food-fraud-vulnerability-assessment
Pwc food-fraud-vulnerability-assessmentJannteh Nieves
 
John O'Brien - food safety in R&D
John O'Brien - food safety in R&DJohn O'Brien - food safety in R&D
John O'Brien - food safety in R&DNestlé SA
 
Food substitution | AIFST Annual conference 2015
Food substitution | AIFST Annual conference 2015Food substitution | AIFST Annual conference 2015
Food substitution | AIFST Annual conference 2015Janine Curll
 
Session 4. Roy - Reducing Adulteration in Milk in India
Session 4. Roy - Reducing Adulteration in Milk in IndiaSession 4. Roy - Reducing Adulteration in Milk in India
Session 4. Roy - Reducing Adulteration in Milk in IndiaAg4HealthNutrition
 
Sw Mi Enviro Health Assoc Fall Conf 101609
Sw Mi Enviro Health Assoc Fall Conf 101609Sw Mi Enviro Health Assoc Fall Conf 101609
Sw Mi Enviro Health Assoc Fall Conf 101609Sandy_Enness
 
Food Fraud: Compromising profit, quality, and trust
Food Fraud: Compromising profit, quality, and trustFood Fraud: Compromising profit, quality, and trust
Food Fraud: Compromising profit, quality, and trustAudioEducator
 
A Food Ingredient’s Journey to Your Dinner Table
A Food Ingredient’s Journey to Your Dinner TableA Food Ingredient’s Journey to Your Dinner Table
A Food Ingredient’s Journey to Your Dinner TableFood Insight
 
Authenticity research at RIKILT: role of visual research
Authenticity research at RIKILT: role of visual researchAuthenticity research at RIKILT: role of visual research
Authenticity research at RIKILT: role of visual researchRikilt (Wageningen UR)
 
Produce foodsafetyebook may2008
Produce foodsafetyebook may2008Produce foodsafetyebook may2008
Produce foodsafetyebook may2008Debbie-Ann Hall
 
Functional food consumer survey media webcast
Functional food consumer survey media webcastFunctional food consumer survey media webcast
Functional food consumer survey media webcastFood Insight
 
COVID-19 mitigation and effects on food safety
COVID-19 mitigation and effects on food safetyCOVID-19 mitigation and effects on food safety
COVID-19 mitigation and effects on food safetyILRI
 
Global food safety: Situation and challenges
Global food safety: Situation and challengesGlobal food safety: Situation and challenges
Global food safety: Situation and challengesILRI
 
Food Safety Risk Analysis - Part 1
Food Safety Risk Analysis - Part 1Food Safety Risk Analysis - Part 1
Food Safety Risk Analysis - Part 1safefood360
 
Milk, meat and fish—More than just food: Current research on food safety in s...
Milk, meat and fish—More than just food: Current research on food safety in s...Milk, meat and fish—More than just food: Current research on food safety in s...
Milk, meat and fish—More than just food: Current research on food safety in s...ILRI
 
Direct market costs of aflatoxins in Kenyan dairy value chain
Direct market costs of aflatoxins in Kenyan dairy value chainDirect market costs of aflatoxins in Kenyan dairy value chain
Direct market costs of aflatoxins in Kenyan dairy value chainILRI
 
Criminal Sanctions - A Real Risk in Food Production
Criminal Sanctions - A Real Risk in Food ProductionCriminal Sanctions - A Real Risk in Food Production
Criminal Sanctions - A Real Risk in Food ProductionBill Marler
 

La actualidad más candente (20)

Pwc food-fraud-vulnerability-assessment
Pwc food-fraud-vulnerability-assessmentPwc food-fraud-vulnerability-assessment
Pwc food-fraud-vulnerability-assessment
 
Economically Motivated Adulteration
Economically Motivated AdulterationEconomically Motivated Adulteration
Economically Motivated Adulteration
 
John O'Brien - food safety in R&D
John O'Brien - food safety in R&DJohn O'Brien - food safety in R&D
John O'Brien - food safety in R&D
 
Food substitution | AIFST Annual conference 2015
Food substitution | AIFST Annual conference 2015Food substitution | AIFST Annual conference 2015
Food substitution | AIFST Annual conference 2015
 
Session 4. Roy - Reducing Adulteration in Milk in India
Session 4. Roy - Reducing Adulteration in Milk in IndiaSession 4. Roy - Reducing Adulteration in Milk in India
Session 4. Roy - Reducing Adulteration in Milk in India
 
Sw Mi Enviro Health Assoc Fall Conf 101609
Sw Mi Enviro Health Assoc Fall Conf 101609Sw Mi Enviro Health Assoc Fall Conf 101609
Sw Mi Enviro Health Assoc Fall Conf 101609
 
Food Safety vs. Food Defense
Food Safety vs. Food DefenseFood Safety vs. Food Defense
Food Safety vs. Food Defense
 
Food Fraud: Compromising profit, quality, and trust
Food Fraud: Compromising profit, quality, and trustFood Fraud: Compromising profit, quality, and trust
Food Fraud: Compromising profit, quality, and trust
 
A Food Ingredient’s Journey to Your Dinner Table
A Food Ingredient’s Journey to Your Dinner TableA Food Ingredient’s Journey to Your Dinner Table
A Food Ingredient’s Journey to Your Dinner Table
 
Authenticity research at RIKILT: role of visual research
Authenticity research at RIKILT: role of visual researchAuthenticity research at RIKILT: role of visual research
Authenticity research at RIKILT: role of visual research
 
Produce foodsafetyebook may2008
Produce foodsafetyebook may2008Produce foodsafetyebook may2008
Produce foodsafetyebook may2008
 
Functional food consumer survey media webcast
Functional food consumer survey media webcastFunctional food consumer survey media webcast
Functional food consumer survey media webcast
 
IGIDR-IFPRI -Opportunities for Ensuring Safe Food, Anjani Kumar, IFPRI
IGIDR-IFPRI -Opportunities for Ensuring Safe Food,  Anjani Kumar, IFPRIIGIDR-IFPRI -Opportunities for Ensuring Safe Food,  Anjani Kumar, IFPRI
IGIDR-IFPRI -Opportunities for Ensuring Safe Food, Anjani Kumar, IFPRI
 
COVID-19 mitigation and effects on food safety
COVID-19 mitigation and effects on food safetyCOVID-19 mitigation and effects on food safety
COVID-19 mitigation and effects on food safety
 
Global food safety: Situation and challenges
Global food safety: Situation and challengesGlobal food safety: Situation and challenges
Global food safety: Situation and challenges
 
Food Safety Risk Analysis - Part 1
Food Safety Risk Analysis - Part 1Food Safety Risk Analysis - Part 1
Food Safety Risk Analysis - Part 1
 
Milk, meat and fish—More than just food: Current research on food safety in s...
Milk, meat and fish—More than just food: Current research on food safety in s...Milk, meat and fish—More than just food: Current research on food safety in s...
Milk, meat and fish—More than just food: Current research on food safety in s...
 
Direct market costs of aflatoxins in Kenyan dairy value chain
Direct market costs of aflatoxins in Kenyan dairy value chainDirect market costs of aflatoxins in Kenyan dairy value chain
Direct market costs of aflatoxins in Kenyan dairy value chain
 
Criminal Sanctions - A Real Risk in Food Production
Criminal Sanctions - A Real Risk in Food ProductionCriminal Sanctions - A Real Risk in Food Production
Criminal Sanctions - A Real Risk in Food Production
 
Presentation by Delia Grace, Food Safety Workshop 24 May 2017
Presentation by Delia Grace, Food Safety Workshop 24 May 2017Presentation by Delia Grace, Food Safety Workshop 24 May 2017
Presentation by Delia Grace, Food Safety Workshop 24 May 2017
 

Destacado

Inside the Mind of a Food Safety Auditor
Inside the Mind of a Food Safety AuditorInside the Mind of a Food Safety Auditor
Inside the Mind of a Food Safety AuditorTraceGains
 
الزيوت والدهون ومنتجاتها: معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...
الزيوت والدهون ومنتجاتها:  معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...الزيوت والدهون ومنتجاتها:  معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...
الزيوت والدهون ومنتجاتها: معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...Malaysian Palm Oil Council (MPOC Egypt)
 
Indian food safety and standards Act, 2006
Indian food safety and standards Act, 2006Indian food safety and standards Act, 2006
Indian food safety and standards Act, 2006ILRI
 
Brandwitz '14: Grand Finale: The A-DIM
Brandwitz '14: Grand Finale: The A-DIMBrandwitz '14: Grand Finale: The A-DIM
Brandwitz '14: Grand Finale: The A-DIMH. M. Ifteker Mahmud
 
food fortification & adultertion
food fortification & adultertionfood fortification & adultertion
food fortification & adultertionDr Vaibhav Gupta
 
Food adulteration
Food adulterationFood adulteration
Food adulterationrashed027
 
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...XIMEA
 
FOOD ADULTERATION Prasad ppt1
FOOD ADULTERATION Prasad ppt1FOOD ADULTERATION Prasad ppt1
FOOD ADULTERATION Prasad ppt1prasadnalla
 
Picarro - A Revolution in Food Safety and Food Fraud Detection
Picarro - A Revolution in Food Safety and Food Fraud DetectionPicarro - A Revolution in Food Safety and Food Fraud Detection
Picarro - A Revolution in Food Safety and Food Fraud DetectionPicarro
 
Food adulterasion
Food  adulterasionFood  adulterasion
Food adulterasion9829148712
 

Destacado (18)

Inside the Mind of a Food Safety Auditor
Inside the Mind of a Food Safety AuditorInside the Mind of a Food Safety Auditor
Inside the Mind of a Food Safety Auditor
 
Food poisoning
Food poisoning Food poisoning
Food poisoning
 
الزيوت والدهون ومنتجاتها: معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...
الزيوت والدهون ومنتجاتها:  معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...الزيوت والدهون ومنتجاتها:  معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...
الزيوت والدهون ومنتجاتها: معايير الجودة وطرق كشف الغش باستخدام أجهزة التحالي...
 
Indian food safety and standards Act, 2006
Indian food safety and standards Act, 2006Indian food safety and standards Act, 2006
Indian food safety and standards Act, 2006
 
PFA
PFAPFA
PFA
 
Brandwitz '14: Grand Finale: The A-DIM
Brandwitz '14: Grand Finale: The A-DIMBrandwitz '14: Grand Finale: The A-DIM
Brandwitz '14: Grand Finale: The A-DIM
 
food fortification & adultertion
food fortification & adultertionfood fortification & adultertion
food fortification & adultertion
 
Food adulteration
Food adulterationFood adulteration
Food adulteration
 
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...
XIMEA Presentation by Max Larin: HSI Cameras for Food Safety and Fraud Detect...
 
FOOD ADULTERATION Prasad ppt1
FOOD ADULTERATION Prasad ppt1FOOD ADULTERATION Prasad ppt1
FOOD ADULTERATION Prasad ppt1
 
PREVENTION OF FOOD ADULTERATION
PREVENTION OF FOOD ADULTERATIONPREVENTION OF FOOD ADULTERATION
PREVENTION OF FOOD ADULTERATION
 
Food adulteration
Food adulterationFood adulteration
Food adulteration
 
Food adulteration
Food adulterationFood adulteration
Food adulteration
 
FSSAI Act - Presentation
FSSAI Act - PresentationFSSAI Act - Presentation
FSSAI Act - Presentation
 
Picarro - A Revolution in Food Safety and Food Fraud Detection
Picarro - A Revolution in Food Safety and Food Fraud DetectionPicarro - A Revolution in Food Safety and Food Fraud Detection
Picarro - A Revolution in Food Safety and Food Fraud Detection
 
Food adulteration
Food adulterationFood adulteration
Food adulteration
 
Food science and standard authorty of india
Food science and standard authorty of indiaFood science and standard authorty of india
Food science and standard authorty of india
 
Food adulterasion
Food  adulterasionFood  adulterasion
Food adulterasion
 

Similar a Combating Product Counterfeiting Risk To Supply Chain

Issues of Food Security and Insurance
Issues of Food Security and InsuranceIssues of Food Security and Insurance
Issues of Food Security and InsuranceLinda Morris Kelley
 
FOOD SUPPLY CHAIN - RISK MANAGEMENT
FOOD SUPPLY CHAIN - RISK MANAGEMENTFOOD SUPPLY CHAIN - RISK MANAGEMENT
FOOD SUPPLY CHAIN - RISK MANAGEMENTSriram M
 
Presentation2 food safetay and hygiene 01 jan-2019
Presentation2 food safetay and hygiene 01 jan-2019Presentation2 food safetay and hygiene 01 jan-2019
Presentation2 food safetay and hygiene 01 jan-2019Abubakar Cadaroosh
 
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...John Blue
 
Food Safety And Quality Assurance K R.pptx
Food Safety And Quality Assurance K R.pptxFood Safety And Quality Assurance K R.pptx
Food Safety And Quality Assurance K R.pptxKARTHIK REDDY C A
 
The Role of Risk Assessment in Food Safety Systems
The Role of Risk Assessment in Food Safety SystemsThe Role of Risk Assessment in Food Safety Systems
The Role of Risk Assessment in Food Safety SystemsUN SPHS
 
Microbiological risk assessment on food borne pathogens
Microbiological risk assessment on food borne pathogensMicrobiological risk assessment on food borne pathogens
Microbiological risk assessment on food borne pathogensHariharan R
 
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its Implications
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its ImplicationsDr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its Implications
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its ImplicationsJohn Blue
 
Food safety performance in animal-source food value chains
Food safety performance in animal-source food value chainsFood safety performance in animal-source food value chains
Food safety performance in animal-source food value chainsILRI
 
Mulitidisciplinary approach (1)
Mulitidisciplinary approach (1)Mulitidisciplinary approach (1)
Mulitidisciplinary approach (1)Jeyadeepa Ramaraj
 
COVID-19 vaccine plan
COVID-19 vaccine plan COVID-19 vaccine plan
COVID-19 vaccine plan SABC News
 
A global challenge to reduce harm and save lives
A global challenge to reduce harm and save livesA global challenge to reduce harm and save lives
A global challenge to reduce harm and save livesProqualis
 
UK Diagnostics Summit Presentations
UK Diagnostics Summit PresentationsUK Diagnostics Summit Presentations
UK Diagnostics Summit PresentationsScott Buckler
 
Dr. Nevil Speer - Wrap-up Key Speaker
Dr. Nevil Speer - Wrap-up Key SpeakerDr. Nevil Speer - Wrap-up Key Speaker
Dr. Nevil Speer - Wrap-up Key SpeakerJohn Blue
 

Similar a Combating Product Counterfeiting Risk To Supply Chain (20)

Issues of Food Security and Insurance
Issues of Food Security and InsuranceIssues of Food Security and Insurance
Issues of Food Security and Insurance
 
FOOD SUPPLY CHAIN - RISK MANAGEMENT
FOOD SUPPLY CHAIN - RISK MANAGEMENTFOOD SUPPLY CHAIN - RISK MANAGEMENT
FOOD SUPPLY CHAIN - RISK MANAGEMENT
 
Global Food Safety_2013
Global Food Safety_2013Global Food Safety_2013
Global Food Safety_2013
 
Food Defense Presentation.pptx
 Food Defense Presentation.pptx Food Defense Presentation.pptx
Food Defense Presentation.pptx
 
Food
FoodFood
Food
 
Presentation2 food safetay and hygiene 01 jan-2019
Presentation2 food safetay and hygiene 01 jan-2019Presentation2 food safetay and hygiene 01 jan-2019
Presentation2 food safetay and hygiene 01 jan-2019
 
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...
Dr. Lonnie King - One Health Antibiotic Stewardship - What MUST Be Done Next:...
 
Topic 10 technology
Topic 10 technologyTopic 10 technology
Topic 10 technology
 
Food Safety And Quality Assurance K R.pptx
Food Safety And Quality Assurance K R.pptxFood Safety And Quality Assurance K R.pptx
Food Safety And Quality Assurance K R.pptx
 
The Role of Risk Assessment in Food Safety Systems
The Role of Risk Assessment in Food Safety SystemsThe Role of Risk Assessment in Food Safety Systems
The Role of Risk Assessment in Food Safety Systems
 
Microbiological risk assessment on food borne pathogens
Microbiological risk assessment on food borne pathogensMicrobiological risk assessment on food borne pathogens
Microbiological risk assessment on food borne pathogens
 
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its Implications
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its ImplicationsDr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its Implications
Dr. Nevil Speer - Update on Foot-and-Mouth Disease (FMD) and its Implications
 
Food
FoodFood
Food
 
Food safety performance in animal-source food value chains
Food safety performance in animal-source food value chainsFood safety performance in animal-source food value chains
Food safety performance in animal-source food value chains
 
Antimicrobial Stewardship
Antimicrobial StewardshipAntimicrobial Stewardship
Antimicrobial Stewardship
 
Mulitidisciplinary approach (1)
Mulitidisciplinary approach (1)Mulitidisciplinary approach (1)
Mulitidisciplinary approach (1)
 
COVID-19 vaccine plan
COVID-19 vaccine plan COVID-19 vaccine plan
COVID-19 vaccine plan
 
A global challenge to reduce harm and save lives
A global challenge to reduce harm and save livesA global challenge to reduce harm and save lives
A global challenge to reduce harm and save lives
 
UK Diagnostics Summit Presentations
UK Diagnostics Summit PresentationsUK Diagnostics Summit Presentations
UK Diagnostics Summit Presentations
 
Dr. Nevil Speer - Wrap-up Key Speaker
Dr. Nevil Speer - Wrap-up Key SpeakerDr. Nevil Speer - Wrap-up Key Speaker
Dr. Nevil Speer - Wrap-up Key Speaker
 

Más de John E Griggs, Ph.D.

Our Compliance Plan Templates and Tracking Worksheets
Our Compliance Plan Templates and Tracking WorksheetsOur Compliance Plan Templates and Tracking Worksheets
Our Compliance Plan Templates and Tracking WorksheetsJohn E Griggs, Ph.D.
 
Assimilating the Ideas of Quality and Sustainability
Assimilating the Ideas of Quality and SustainabilityAssimilating the Ideas of Quality and Sustainability
Assimilating the Ideas of Quality and SustainabilityJohn E Griggs, Ph.D.
 
A Sustainable Supply Chain: 4 Things to Tell Management
A Sustainable Supply Chain: 4 Things to Tell ManagementA Sustainable Supply Chain: 4 Things to Tell Management
A Sustainable Supply Chain: 4 Things to Tell ManagementJohn E Griggs, Ph.D.
 
Faster Response To Foodborne Incidents
Faster Response To Foodborne IncidentsFaster Response To Foodborne Incidents
Faster Response To Foodborne IncidentsJohn E Griggs, Ph.D.
 

Más de John E Griggs, Ph.D. (6)

Our Compliance Plan Templates and Tracking Worksheets
Our Compliance Plan Templates and Tracking WorksheetsOur Compliance Plan Templates and Tracking Worksheets
Our Compliance Plan Templates and Tracking Worksheets
 
Assimilating the Ideas of Quality and Sustainability
Assimilating the Ideas of Quality and SustainabilityAssimilating the Ideas of Quality and Sustainability
Assimilating the Ideas of Quality and Sustainability
 
A Sustainable Supply Chain: 4 Things to Tell Management
A Sustainable Supply Chain: 4 Things to Tell ManagementA Sustainable Supply Chain: 4 Things to Tell Management
A Sustainable Supply Chain: 4 Things to Tell Management
 
NEHA Survey Presentation 2008
NEHA Survey Presentation 2008NEHA Survey Presentation 2008
NEHA Survey Presentation 2008
 
Faster Response To Foodborne Incidents
Faster Response To Foodborne IncidentsFaster Response To Foodborne Incidents
Faster Response To Foodborne Incidents
 
Product Counterfeiting
Product CounterfeitingProduct Counterfeiting
Product Counterfeiting
 

Combating Product Counterfeiting Risk To Supply Chain

  • 1. Combating The Impact of Product Counterfeiting: Defining the Growing Risk to Supply Chain Cost and Service Performance Omar Keith Helferich PhD September 23, 2010
  • 2. Overview • Source of Information and experience • Review of Planning and Response during major disruption events • Review of MSU National Center for Food Protection and Defense Research • Recommendations to enhance Food Supply Protection © 2010 Michigan State University
  • 3. Research and Industry Perspective • Michigan State Anti-Counterfeiting and Product Protection Program (A-CAPPP) • National Center for Food Protection and Defense (NCFPD)-Food and Pharmaceuticals • National Environmental Health Association • Industry Sustainability Assessment © 2010 Michigan State University
  • 4. Review: Counterfeit in Food Safety Discussion Scope Counterfeit/ Economic Fraud Food Defense/ Food Safety Bioterrorism © 2010 Michigan State University
  • 5. Review: Counterfeit Actions • Adulterator • Tamperer • Thief • Over-runs/ Unauthorized Production • Diversion • Simulation or Look-a-likes • Counterfeiter © 2010 Michigan State University
  • 6. Review: Supply Chain Aspects of the Food Threat • The international supply chain – Overview – Diversion – Transshipment – Free Trade Zones • SCM countermeasures and deterrents – Integrated approach/ raise the stakes – Coordinated activities/ countermeasures © 2010 Michigan State University
  • 7. Review: Food Fraud Scale • The global counterfeit food threat is estimated at $49 billion, and the UK’s Food Standards Board (FSA) estimates the UK “level of fraud” around 10 percent. (Ravilious, 2006) © 2010 Michigan State University
  • 8. Review: Food Fraud Scope • Product Substitution • Product Up-labeling • Product Adulteration • Product Copy/ Unauthorized Refill • Product “Freshening” © 2010 Michigan State University
  • 9. Review: Counterfeit Countermeasures • Overt • Covert • Forensic • Track-and-Trace • Authentication • Investigation • Regulation • …Standard Operating Procedures © 2010 Michigan State University
  • 10. Research and Field Experience: Over 25 years • Safety & Environmental Health Ground Zero engineering & research WTC 2001 • Coordinating Logistics for • Red Cross Logistics & Mass Care Field Volunteer during major events • MSU Food Security Research Team for DHS -2005-07 • Research in sustainability & disaster planning & recovery • Co-Developed initial white paper on supply chain security following WTC 2001 Issues: Chaos after an Incident Public Health Secondary Events Communications & Infrastructure Damage Economic and Public Services Recovery © 2010 Michigan State University
  • 11. Dimensions of SC Security: Incident Management Process(*) 3. Detection 4. Response 2. Mitigation Lessons Learned 5. Recovery 1. Planning Supply Network Continuity Management Process *Comprehensive *Simple *Flexible *Tested *Revised for Changing Threats Minimizes Loss & Disruption * Drs. Helferich and Cook: 2002 CLM Research Results © 2010 Michigan State University
  • 12. Dimensions of Supply Chain Security: Impact Matrix Attribute Scale Measure Severity Minor to Massive Lives, Injuries, Fear, Dollars, Performance Duration - Minutes to Years Time Impact Geographical Local to Global Square Miles and Boundaries Detectability Easy to Difficult Warning Systems and Awareness Frequency Low to High Historical vs. Concern Wind, Water, Disease, Fire, Explosion, Contamination, Radiation Other SC Disruptions - Intentional/Unintentional © 2010 Michigan State University
  • 13. Dimensions of Supply Chain Security : Measures • Ability to detect security incidents • Reduction in the number of security incidents • Increased resilience in recovery • Changed risk profile –exposure vs. actual cost • Changed cost with continuity programs, insurance vs. shrink, injuries, downtime, turnover, temporary substitution • Improved security relative to competitors • Improved ability to meet security requirements • Relationships without recognition of potential risk vulnerabilities © 2010 Michigan State University
  • 14. Intentional and Accidental Food Contamination and Disease Outbreak Impacts Year Event Impact 1984 Salad bar contaminated by religious cult 751 ill 1989 Detection of cyanide in Chilean grapes $200 M 1996 Outbreak of BSE in UK cattle $5.8 B 1997 Outbreak of FMD in Taiwan pork 3.85 M hogs 1999 Contamination of livestock feed with dioxin $850 M 2001 Outbreak of FMD in UK cattle $8.32 B 2003 Exotic Newcastle disease in US poultry $180 M After 03 Spinach, Beef, Pet food, Toothpaste, Seafood, etc. $M to $B Yearly Losses due to 5 major food borne pathogens in US food $6.9 B supply © 2010 Michigan State University
  • 15. Food Supply Vulnerability (*) • Planning completed to prepare and respond to intentional disruptions is also valuable for natural or accidental events. • The severity and impacts of the incident are dependent on the agent and scenario, ability to accomplish the event, and efficiency and effectiveness of detection and response. • Significant evidence has been found that indicates that agro terrorism is a target of terrorist groups. • World Health Organization urges “farm to fork” contingency planning due to the potential impact of attacks on national food supply sources. WHO states the following as examples, but expects it could be much worse depending on the agent used: • 1985- 170,000 sick in the US from contaminated pasteurized milk • 1991- 300,000 infected with Hepatitis A from clams sourced in China • 1994- 224,000 infected with salmonella from ice cream in US * Dept of Homeland Security: Areas of Vulnerability: People, Physical & Processes © 2010 Michigan State University
  • 16. Introduction and Dimensions of Supply Chain Security • The application of policies, procedures, and technology to protect SC assets (product, facilities, equipment, information, and personnel) from theft, damage, or terrorism and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction. – Closs and McGarrell (2004) © 2010 Michigan State University
  • 17. MSU R&D Initiatives: DHS Supply Chain Security Benchmarking Objectives • Define Supply Chain Security • Identify status of supply chain security initiatives • Identify competencies and capabilities that firms are using to enhance supply chain security • Discuss benchmarking tool for improving supply chain security This research was supported by the U.S. Department of Homeland Security (Grant number N-00014-04-1-0659), through a grant awarded to the National Center for Food Protection and Defense at the University of Minnesota. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author (s) and do not represent the policy or position of the Department of Homeland Security. © 2010 Michigan State University
  • 18. MSU DHS Research Supply Chain Security Impact: A State of Transition • From • To – Corporate security – Cross functional team – Theft prevention – To include anti-terrorism – Inside the company – End-to-end supply chain – Vertically integrated supply – Business model that includes 2nd chain with 1st tier suppliers and 3rd tier suppliers – Country or geographic – Global – Contingency planning – To include crisis management – Reactive – Proactive © 2010 Michigan State University
  • 19. MSU Research Conclusions • Food supply chain firms are increasingly interested in protecting their supply chains to protect their customers and brand names. • Firms must develop a broad range of competencies to achieve supply chain protection. • Firms have seen performance improvements in detection and resiliency. • In general, firms embarking on supply chain security initiatives will, at least initially, increase firm and supply chain operating cost. • Better performance is linked to extended supply chain security efforts throughout the supply chain. © 2010 Michigan State University
  • 20. Where is Your Firm’s Security Program Opportunity? Vital Segments Priority Tools/ Methods Improvement Tasks/COAs 1. Senior Management Input Formalize Senior Mgt Council 2. Risk Assessment Define and Prioritize Risks 3. Benchmarking Formal Benchmarking-MSU 4. Facility Security Risk Utilize Formal Risk Assessment Assessment- Carver Shock 5. Baseline Security- Top Priority Risks Protection 6. Enhanced Security- CRT Process for Unique Protection Incidents 7. Security Program Design SC Cross Functional & Process Design 8. Plan and Process Independent Audits Implementation 9. Process Monitoring & In Line Security Process with Control Balanced Scorecard Metrics 10. Process Review Ongoing Measurement & Learning Accumulative Continuous Improvement © 2010 Michigan State University
  • 21. Assessment of Food Vulnerability: CARVER Plus Shock • Assessment method most commonly used and recommended by both USDA and FDA is the CARVER plus Shock. • This tool can be used to assess vulnerabilities within a system or infrastructure. Conducting the assessment allows focus on the most vulnerable points that pose the greatest risk. © 2010 Michigan State University
  • 22. Assessment of Food Vulnerability: CARVER Plus Shock • CARVER plus Shock is an acronym for seven attributes used to evaluate the attractiveness of a target for attack: – Criticality- measure of public & economic impacts – Accessibility-ability to access target – Recuperability- ability for system to recover – Vulnerability- ease of accomplishing the attack – Effect- amount of direct loss from attack – Recognizability- ease of identifying the target – Shock- combined measure of the physical, health, psychological and economic effects of attack © 2010 Michigan State University
  • 23. Summary of Key Learning's: Supply Chain & Security • . Need for a “Baseline Process” based on Risk • Recognition that Security is not a “Quick Fix” • Promoting that “Security is everyone’s responsibility • Supply Chain concerns, not only enterprise or functional specialties • Noticed/addressed based upon crises and failures, not successes • Only as robust as the weakest link • Weakened by poor communications and technology, personality and “turf” politics • Most successful when integrated into operations, not add-ons • Essential to business success with in-line process support of BU • In need of increased focus on Internal Access Control and Monitoring • In need of Increased focus on intentional incidents contaminations • Executive cross-functional security councils w/leveraged cross-functional leaders to drive agenda © 2010 Michigan State University
  • 24. Combating Counterfeiting & Adulteration Supply Chain Risk Supply Chain Counterfeiting GAPS & Opportunities Current & Emerging Best Practices Guidelines, Development of Prevention & Mitigation Guidelines Checklists, Standards Risk Based Analysis Development of Supply Chain Anti-Counterfeiting Internal Proven Standards Standards Development Processes Recommended Process for Standards Implementation & Enforcement © 2010 Michigan State University
  • 25. Risk and the Response-based Business Model Response-based Business Model* DISRUPTION EVENTS Natural Criminal/Terrorist Public Health Supply Network Lean Inventory Process/Equipment Rationalization Management Law / Regulations Globalization *Bowersox & Lahowchic, “Start Pulling Your Chain” © 2010 Michigan State University
  • 26. Dimensions of SC Security: Expectations- A Changing Future • Secure supply chains – containing advanced security processes and procedures • Resilient supply chains – able to react to unexpected disruptions quickly in order to restore normal operations Rice and Caniato (2003), “Building a Secure and Resilient Supply Network,” Supply Chain Management Review, September/October. © 2010 Michigan State University
  • 27. SC Protection: Potential Mitigation Programs Proactive Sustaining Environment Excellence Executive Commitment Mitigation Pathway to Success Process Human Resource Backup- Cross Training Continuity Training & Education Process Redesign Mutual Aid Agreements Supply Chain Network Design Shared Committed Inventory Critical Parts Inventory Reactive Assets Backup General Parts Catalog Increase Parts Inventory Environment Collaborative Arrangements Process Backup Systems Backup Vision Control Team Process Supply Chain Mitigation Initiatives: Physical, People, & Process © 2010 Michigan State University
  • 28. Average Percent Improvement Reported by Manufacturers from SCS Investments Efficiency Visibility 60 60 50 48 50 50 40 43 Reduced Inspections 40 Improved Asset Visibility Percent Increased Automated Handling Percent 30 More Timely Shipping Information 30 29 Less Process Deviation 30 30 20 Shorter Transit Time Reduced Inaccurate Shipping Data 20 10 10 9 0 Resiliency Inventory Management & Customer Relations 35 40 30 31 38 37 25 Shorter Problem 30 Resolution Time Reduced Theft/Loss/Pilferage 23 20 Percent 21 Quicker Response to a 26 Decreased Tampering Percent Problem Less Customer Attrition 15 20 Reduced Time to Identify Reduced Excess Inventory 10 a Problem 14 10 5 0 0 Source: Innovators in Supply Chain Security: Better Security Drives Business Value – Stanford University White Paper, June 2006 © 2010 Michigan State University
  • 29. Discussion and Feedback Thank You! SC Security ‘Brand Protection Pays’
  • 30. Review: Packaging for Food and Product Protection (P-FAPP) Initiative • The first step in the P-FAPP Product Protection Initiative is to create Teaching and Outreach Funding to develop university course content, to develop infrastructure, and to validate the long-term interest in the topic. • Teaching and Outreach Funding Deliverables: – Undergraduate/ graduate Product Protection On-line Course – June 2008 – Executive education: Offer a Product Protection ‘short course’ – September 2008 – Certificate/ degree program: In development – Continue the aggressive schedule of academic and industry presentations • For information please contact MSU/P-FAPP directly: – John Spink, Director, P-FAPP, 517.381.4491, SpinkJ@msu.edu – http://foodsafe.msu.edu/Packaging_for_Food_and_Product_Protection_Initiative.html • Dr. Helferich may be reached at okeithhelferich@msn.com or info@supplychainsustainability.com © 2010 Michigan State University