Focused Mitigation Strategies To Protect Food Against Intentional Adulteration, 78013-78061 [2013-30373]
Download as PDF
Vol. 78
Tuesday,
No. 247
December 24, 2013
Part III
Department of Health and Human Services
sroberts on DSK5SPTVN1PROD with PROPOSALS
Food and Drug Administration
21 CFR Parts 16 and 121
Focused Mitigation Strategies To Protect Food Against Intentional
Adulteration; Proposed Rule
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
PO 00000
Frm 00001
Fmt 4717
Sfmt 4717
E:\FR\FM\24DEP2.SGM
24DEP2
78014
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Food and Drug Administration
21 CFR Parts 16 and 121
[Docket No. FDA–2013–N–1425]
RIN 0910–AG63
Focused Mitigation Strategies To
Protect Food Against Intentional
Adulteration
AGENCY:
Food and Drug Administration,
HHS.
ACTION:
Proposed rule.
The Food and Drug
Administration (FDA or we) is
proposing to require domestic and
foreign food facilities that are required
to register under the Federal Food, Drug,
and Cosmetic Act (the FD&C Act) to
address hazards that may be
intentionally introduced by acts of
terrorism. These food facilities would be
required to identify and implement
focused mitigation strategies to
significantly minimize or prevent
significant vulnerabilities identified at
actionable process steps in a food
operation. FDA is proposing these
requirements as part of our
implementation of the FDA Food Safety
Modernization Act (FSMA). Further, as
part of the proposal, FDA discusses an
approach to addressing economically
motivated intentional adulteration. We
expect the proposed rule, if finalized as
proposed, would help to protect food
from intentional adulteration caused by
acts of terrorism.
DATES: Submit either electronic or
written comments on the proposed rule
by March 31, 2014. Submit comments
on information collection issues under
the Paperwork Reduction Act of 1995 by
January 23, 2014, (see the ‘‘Paperwork
Reduction Act of 1995’’ section of this
document).
ADDRESSES: You may submit comments,
identified by Docket No. FDA–2013–N–
1425 and/or Regulatory Information
Number (RIN) 0910–AG63, by any of the
following methods, except that
comments on information collection
issues under the Paperwork Reduction
Act of 1995 must be submitted to the
Office of Information and Regulatory
Affairs, Office of Management and
Budget (OMB) (see the ‘‘Paperwork
Reduction Act of 1995’’ section of this
document).
sroberts on DSK5SPTVN1PROD with PROPOSALS
SUMMARY:
Electronic Submissions
Submit electronic comments in the
following way:
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
Written Submissions
Submit written submissions in the
following ways:
• Mail/Hand delivery/Courier (for
paper or CD–ROM submissions):
Division of Dockets Management (HFA–
305), Food and Drug Administration,
5630 Fishers Lane, rm. 1061, Rockville,
MD 20852.
Instructions: All submissions received
must include the Agency name and
Docket No. FDA–2013–N–1425 and
Regulatory Information Number (RIN)
0910–AG63 for this rulemaking. All
comments received may be posted
without change to https://
www.regulations.gov, including any
personal information provided. For
additional information on submitting
comments, see the ‘‘Comments’’ heading
of the SUPPLEMENTARY INFORMATION
section of this document.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov and insert the
docket number, found in brackets in the
heading of this document, into the
‘‘Search’’ box and follow the prompts
and/or go to the Division of Dockets
Management, 5630 Fishers Lane, rm.
1061, Rockville, MD 20852.
FOR FURTHER INFORMATION CONTACT:
Regarding the provisions with respect to
human food: Ryan Newkirk, Center for
Food Safety and Applied Nutrition
(HFS–005), Food and Drug
Administration, 5100 Paint Branch
Pkwy., College Park, MD 20740, 240–
402–2428. Regarding the provisions
with respect to food for animals: Alfred
Montgomery, Center for Veterinary
Medicine (HFV–200), Food and Drug
Administration, 7519 Standish Pl.,
Rockville, MD 20855, 240–453–6836.
SUPPLEMENTARY INFORMATION:
A. Framework of the Rule
B. Activities That Occur on Produce Farms
C. Transportation Carriers
D. Food for Animals
E. Acts of Disgruntled Employees,
Consumers, or Competitors
F. Economically Motivated Adulteration
G. Low-Risk Activities at Farm Mixed-Type
Facilities
H. Activities That Occur on Dairy Farms
I. Other Ways To Focus on Foods With a
High Risk of Intentional Adulteration
Caused by Terrorism
V. The Proposal
A. Definitions
B. Exemptions
C. Food Defense Measures
D. Requirements Applying to Records That
Must Be Established and Maintained
E. Compliance
VI. Preliminary Regulatory Impact Analysis
VII. Analysis of Environmental Impact
VIII. Federalism
IX. Comments
X. References
Table of Contents
Scope of Coverage of the Proposed Rule
The subject of this proposed rule is
protection of food against intentional
adulteration caused by acts of terrorism.
This proposed rule would apply to both
domestic and foreign facilities that are
required to register under section 415 of
the FD&C Act. However, as explained in
the remainder of this document and
shown in Diagram 1 and Table 1, the
proposed rule contains several
exemptions. (The diagrams and table
below are intended to illustrate the
proposed scope and requirements of this
rule, and do not include all aspects of
the proposed regulation.) These
exemptions are:
• The proposed rule would not apply
to a qualified facility, except that the
Executive Summary
Scope of Coverage of the Proposed Rule
Summary of the Major Provisions of the
Proposed Rule
Costs and Benefits
I. Introduction
II. Background
A. Incidents of Intentional Adulteration of
Food
B. Interagency Approach to Food Defense
C. Resources for the Food Sector
D. Outreach
E. Industry Standards
F. International Food Defense Guidelines
III. Legal Authority
A. Section 103 of FSMA
B. Section 106 of FSMA
C. Intrastate Activities
IV. Regulatory Approach
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
Executive Summary
This proposed regulation implements
three provisions of the Federal Food,
Drug, and Cosmetic (FD&C) Act, as
amended by the FDA Food Safety
Modernization Act (FSMA), that relate
to the intentional adulteration of food.
Section 418 of the FD&C Act (21 U.S.C.
350g) addresses intentional adulteration
in the context of facilities that
manufacture, process, pack, or hold
food and are required to register under
section 415 of the FD&C Act (21 U.S.C.
350d). Section 419 of the FD&C Act (21
U.S.C. 350h) addresses intentional
adulteration in the context of fruits and
vegetables that are raw agricultural
commodities. Section 420 of the FD&C
Act (21 U.S.C. 350i) addresses
intentional adulteration in the context
of high risk foods and exempts farms
except for farms that produce milk. FDA
is implementing the intentional
adulteration provisions in sections 418,
419, and 420 of the FD&C Act in this
rulemaking.
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
facility would be required to provide for
official review, upon request,
documentation that was relied upon to
demonstrate that the facility qualifies
for this exemption. As proposed, a
qualified facility would be: (1) A very
small business (i.e., a business that has
less than $10,000,000 in total annual
sales of food, adjusted for inflation), or
(2) a facility that meets two
requirements, i.e., (a) During the 3-year
period preceding the applicable
calendar year, the average annual
monetary value of the food
manufactured, processed, packed or
held at such facility that is sold directly
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
to qualified end-users (as defined in this
part) during such period exceeded the
average annual monetary value of the
food sold by such facility to all other
purchasers; and (b) the average annual
monetary value of all food sold during
the 3-year period preceding the
applicable calendar year was less than
$500,000, adjusted for inflation.
• This proposed rule would not apply
to the holding of food, except the
holding of food in liquid storage tanks.
• This proposed rule would not apply
to the packing, re-packing, labeling, or
re-labeling of food where the container
that directly contacts the food remains
intact.
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
78015
• This proposed rule would not apply
to activities of a facility that are subject
to section 419 of the Federal Food, Drug,
and Cosmetic Act (Standards for
Produce Safety).
• This proposed rule would not apply
with respect to alcoholic beverages at a
facility that meets certain conditions.
• This proposed rule would not apply
to the manufacturing, processing,
packing, or holding of food for animals
other than man.
We seek comment on these exclusions
and whether additional exclusions are
warranted.
BILLING CODE 4160–01–P
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
BILLING CODE 4160–01–C
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
E:\FR\FM\24DEP2.SGM
24DEP2
EP24DE13.026
sroberts on DSK5SPTVN1PROD with PROPOSALS
78016
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
78017
TABLE 1—SCOPE OF INTENTIONAL ADULTERATION AND PROPOSED EXCLUSIONS AND EXEMPTIONS
Coverage within scope of proposed
21 CFR 121
Type of intentional adulteration
Brief rationale, and relevant corresponding
section of the rule *
I. Types of Intentional Adulteration Considered in this Proposed Rulemaking
1. Acts of disgruntled employees, consumers,
or competitors intended to attack the reputation of a company, and not to cause public
health harm, although public health harm
may occur.
2. Economically motivated adulteration (EMA)
intended to obtain economic gain, and not to
cause public health harm, although public
health harm may occur.
3. Acts intended to cause massive public health
harm, including acts of terrorism.
Not within the scope of intentional adulteration
covered under proposed 21 CFR 121.
D Not considered ‘‘high risk’’ because not intended to cause widespread, significant
public health harm.
D See section IV.E of this document.
Not within the scope of intentional adulteration
covered under proposed 21 CFR 121.
D Considering addressing as part of hazard
analysis in a preventive controls framework
where EMA is ‘‘reasonably likely to occur.’’
D See section IV.F of this document.
D Considered ‘‘high risk’’ because intent of
the act is to cause widespread, significant
public health harm.
D See section IV.A of this document.
Covered within scope, and is the focus of proposed 21 CFR 121.
II. Facilities or Operations Excluded or Exempted from Proposed 21 CFR 121
Facility or Operation
Exclusion or Exemption (and any associated
modified requirements)
Brief rationale, and relevant corresponding
section of the rule *
Activities that fall within the definition of ‘‘farm’’
(as defined in 21 CFR § 1.227).
Excluded ..........................................................
Transportation carriers .......................................
Excluded ..........................................................
D Activities that occur on produce farms are
not considered ‘‘high risk.’’
D Activities that occur on dairy farms are addressed below.
D Activities that occur on other farms are outside the scope of 103, 105, and 106 of
FSMA.
D See section IV.B of this document.
D Transportation of bulk liquids is addressed
by coverage of shippers and receivers.
D Other transportation activities are not considered ‘‘high risk.’’
D See section IV.C of this document.
Activities that occur on dairy farms ....................
D Fluid milk storage and loading appear to pose a significant vulnerability.
D We seek comment on practical and effective approach to address this vulnerability.
D See section IV.H of this document.
Qualified facility, as defined in proposed § 121.3
Exempt, except must provide for FDA review,
upon request, documentation relied on to
demonstrate that the facility qualifies for this
exemption.
Exempt .............................................................
Holding of food, except the holding of food in
liquid storage tanks.
sroberts on DSK5SPTVN1PROD with PROPOSALS
Packing, re-packing, labeling, or re-labeling of
food where the container that directly contacts the food remains intact.
Exempt .............................................................
Activities of a facility that are subject to Standards for Produce Safety (proposed 21 CFR
112).
Alcoholic beverages at certain alcohol-related
facilities, and certain prepackaged food sold
in limited quantities along with alcoholic beverages at the same facilities (see proposed
§ 121.5(e)).
Manufacturing, processing, packing, or holding
of food for animals.
Exempt .............................................................
Exempt .............................................................
Exempt .............................................................
D Very small businesses are not considered
‘‘high risk.’’
D See section V.B.1 of this document.
D Not considered ‘‘high risk’’ because these
activities do not fit within any of the FDAidentified key activity types.
D See section V.B.2 of this document.
D Not considered ‘‘high risk’’ because these
activities do not fit within any of the FDAidentified key activity types.
D See section V.B.3 of this document.
D Activities that occur on produce farms are
not considered ‘‘high risk.’’
D See section V.B.4 of this document.
D Alcoholic beverages at these facilities are
outside the scope of 103, 105, and 106 of
FSMA.
D See section V.B.5 of this document.
D Not considered ‘‘high risk’’ because unlikely
to impact human health.
D See section V.B.6 of this document.
* Please see the corresponding sections of the rule identified in the column for a complete discussion of our analysis, rationale, and tentative
conclusions related to the proposed exclusions or exemption.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
E:\FR\FM\24DEP2.SGM
24DEP2
78018
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
Summary of the Major Provisions of the
Proposed Rule
This proposed rule would establish
various food defense measures that an
owner, operator, or agent in charge of a
facility would be required to implement
to protect against the intentional
adulteration of food, as summarized in
Diagram 2. Specifically:
• Prepare and implement a written
food defense plan that includes
actionable process steps, focused
mitigation strategies, and procedures for
monitoring, corrective actions, and
verification (proposed § 121.126).
• Identify any actionable process
steps, using one of two procedures. FDA
has analyzed vulnerability assessments
conducted using the CARVER+Shock
methodology and identified four key
activity types: Bulk liquid receiving and
loading; Liquid storage and handling;
Secondary ingredient handling; and
Mixing and similar activities. FDA has
determined that the presence of one or
more of these key activity types at a
process step (e.g., manufacturing,
processing, packing, or holding of food)
indicates a significant vulnerability
under section 418 of the FD&C Act and
that the food is at high risk of
intentional adulteration caused by acts
of terrorism under section 420 of the
FD&C Act. Facilities may identify
actionable process steps using the FDAidentified key activity types as
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
described in proposed § 121.130(a) or
conduct their own facility-specific
vulnerability assessments as provided in
proposed § 121.130(b).
• Identify and implement focused
mitigation strategies at each actionable
process step to provide assurances that
the significant vulnerability at each step
will be significantly minimized or
prevented and the food manufactured,
processed, packed, or held by the
facility will not be adulterated
(proposed § 121.135).
• Establish and implement
procedures, including the frequency
with which they are to be performed, for
monitoring the focused mitigation
strategies (proposed § 121.140).
• Establish and implement corrective
action procedures that must be taken if
focused mitigation strategies are not
properly implemented (proposed
§ 121.145).
• Verify that monitoring is being
conducted and appropriate decisions
about corrective actions are being made;
verify that the focused mitigation
strategies are consistently implemented
and are effectively and significantly
minimizing or preventing the significant
vulnerabilities; and conduct a reanalysis
of the food defense plan (proposed
§ 121.150).
• Ensure that personnel and
supervisors assigned to actionable
process steps receive appropriate
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
training in food defense awareness and
their respective responsibilities in
implementing focused mitigation
strategies (proposed § 121.160).
• Establish and maintain certain
records, including the written food
defense plan; written identification of
actionable process steps and the
assessment leading to that
identification; written focused
mitigation strategies; written procedures
for monitoring, corrective actions, and
verification; and documentation related
to training of personnel (proposed
§§ 121.301 to 121.325).
As proposed, the effective date is 60
days after a final rule is published.
However, we are providing for a longer
timeline for facilities to come into
compliance. Facilities, other than small
and very small businesses, would have
one year after the effective date to
comply with proposed part 121. Small
businesses (i.e., those employing fewer
than 500 persons) would have 2 years
after the effective date to comply with
proposed part 121. Very small
businesses (i.e., businesses that have
less than $10,000,000 in total annual
sales of food, adjusted for inflation)
would be considered a qualified facility
and would have 3 years after the
effective date to comply with proposed
§ 121.5(a).
BILLING CODE 4160–01–P
E:\FR\FM\24DEP2.SGM
24DEP2
78019
BILLING CODE 4160–01–C
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
E:\FR\FM\24DEP2.SGM
24DEP2
EP24DE13.027
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
78020
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
In addition, we describe our current
thinking and seek comment on other
issues, including activities that occur on
dairy farms and economically motivated
adulteration. Finally, elsewhere in this
issue of the Federal Register, FDA is
publishing for comment its evaluation
that identifies low-risk activities that
occur at farm mixed-type facilities, with
a specific focus on the risk presented by
hazards that may be intentionally
introduced by acts of terrorism.
Costs and Benefits
As described in the Preliminary
Regulatory Impact Analysis (PRIA), we
estimate the annualized costs of the
actions required by this proposed rule to
be about $370 million. The benefits of
these actions are a reduction in the
possibility of illness, death, and
economic disruption resulting from
intentional adulteration of food. We are
unable to quantify these benefits.
However, we monetize the damage that
various intentional adulteration
scenarios might cause, and present a
breakeven analysis showing the number
of prevented attacks at which the
benefits are larger than the costs.
ANNUALIZED COST AND BENEFIT OVERVIEW
All numbers are USD millions, annualized over 10 years
3% discount
7% discount
Costs:
Learning about Rule .................................................................................................................................
Mitigation Costs ........................................................................................................................................
Monitoring and Corrective Action .............................................................................................................
Employee Training ....................................................................................................................................
Documentation ..........................................................................................................................................
$3
59
100
4
6
$3
63
100
5
6
Subtotal (Domestic cost) ...................................................................................................................
Cost to Foreign Firms ...............................................................................................................................
172
185
177
190
Total ...................................................................................................................................................
357
367
Benefits: Lower Chance of Intentional Adulteration ........................................................................................
sroberts on DSK5SPTVN1PROD with PROPOSALS
I. Introduction
The FDA Food Safety Modernization
Act (FSMA) (Pub. L. 111–353), signed
into law on January 4, 2011, enables
FDA to better protect public health by
helping to ensure the safety and security
of the food supply. FSMA enables us to
focus more on preventing food safety
problems rather than primarily reacting
to problems after they occur. The law
also provides us with new enforcement
authorities to help us achieve higher
rates of compliance with preventionand risk-based safety standards and to
better respond to and contain problems
when they do occur. In addition, the
law gives us important new tools to
better ensure the safety of imported
foods and directs us to build an
integrated national food safety system in
partnership with State, local, tribal, and
territorial authorities.
Section 103 of FSMA directs FDA to
issue regulations establishing
requirements for facilities that
manufacture, process, pack or hold food
and requires facilities to consider
hazards that may be intentionally
introduced, including by acts of
terrorism. Section 106 of FSMA requires
FDA to issue regulations to protect food
for which there is a high risk of
intentional contamination and for
which such intentional contamination
could cause serious adverse health
consequences or death to humans or
animals. In addition, section 105 of
FSMA directs FDA to issue regulations
setting forth science-based minimum
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
standards for the safe production and
harvesting of produce, and requires that
the rulemaking consider hazards that
may be intentionally introduced,
including by acts of terrorism.
Efforts to protect against intentional
adulteration require a shift in
perspective from that applied to
traditional food safety. In proposed
rules entitled ‘‘Current Good
Manufacturing Practice and Hazard
Analysis and Risk-Based Preventive
Controls for Human Food’’ (78 FR 3646,
January 16, 2013) (Docket No. FDA–
2011–N–0920; hereafter referred to as
‘‘the PC proposed rule’’), ‘‘Current Good
Manufacturing Practice and Hazard
Analysis and Risk-Based Preventive
Controls for Food for Animals’’ (78 FR
64736, October 29, 2013) (Docket No.
FDA–2011–N–0922; hereafter referred to
as ‘‘the Animal Food PC proposed
rule’’), and ‘‘Standards for the Growing,
Harvesting, Packing and Holding of
Produce for Human Consumption’’ (78
FR 3504, January 16, 2013) (Docket No.
FDA–2011–N–0921; hereafter referred to
as ‘‘the Produce Safety proposed rule’’),
FDA tentatively decided not to include
requirements to address ‘‘hazards that
may be intentionally introduced,
including by acts of terrorism’’ (sections
418(b)(2) and 419(a)(3)(C) of the FD&C
Act (21 U.S.C. 350g(b)(2) and
350h(a)(3)(C))) and to implement
sections 103 and 105 of FSMA regarding
such hazards in a separate rulemaking
(this proposed rule). As noted in those
proposed rules, FDA tentatively
concluded that intentional adulteration,
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
Unquantified.
which is not addressed by traditional
Hazard Analysis and Critical Controls
Point (HACCP) or other food safety
systems, likely will require different
kinds of controls. FDA is taking the
action described in this proposed rule to
implement the intentional adulteration
provisions in sections 103, 105, and 106
of FSMA.
II. Background
Intentional adulteration of the food
supply can result in catastrophic public
health consequences, widespread public
fear, loss of public confidence in the
safety of food and the ability of
government to ensure food safety, and
significant adverse economic impacts,
including disruption of trade (Ref. 1,
Ref. 2, Ref. 3, Ref. 4). Acts of intentional
adulteration may take several forms,
including acts of terrorism; acts of
disgruntled employees, consumers, or
competitors; and economically
motivated adulteration. Acts of
terrorism are associated with an intent
to cause massive public health harm
and, to a lesser extent, economic
disruption (Ref. 5, Ref. 2, Ref. 3, Ref. 6).
Acts of disgruntled employees,
consumers, or competitors are generally
understood to be directed at attacking
the reputation of the company and not
at public health harm. The primary
purpose of economically motivated
adulteration is to obtain economic gain,
and not to impact public health (Ref. 7,
Ref. 8, Ref. 9), although public health
harm may occur (Ref. 10, Ref. 11).
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
‘‘Food defense’’ and ‘‘food security’’
are terms that are sometimes used
interchangeably. We use the term ‘‘food
defense’’ to refer to the effort to protect
food from acts of intentional
adulteration where there is an intent to
cause public health harm and economic
disruption. ‘‘Food security’’ is defined
by the World Health Organization
(WHO) to mean ‘‘when all people at all
times have access to sufficient, safe,
nutritious food to maintain a healthy
and active life’’ (Ref. 12). To avoid
confusion, we use the term ‘‘food
defense’’ and not the term ‘‘food
security’’ in the context of intentional
adulteration.
A. Incidents of Intentional Adulteration
of Food
Several cases of intentional
adulteration with the intent to cause
public health harm and economic
disruption in the United States have
been documented. For example, in
1984, in an attempt to prevent the
general public from voting in the local
elections, members of a local religious
commune in The Dalles, OR,
intentionally contaminated food in
restaurants with Salmonella. A total of
751 people became ill and 45 were
hospitalized (Ref. 4). In another
incident, in 1996, 12 laboratory workers
at a large medical facility in Texas
became ill from consuming
anonymously donated pastries that were
intentionally contaminated with
Shigella dysenteriae type 2, which was
later discovered to have originated from
the facility’s stock culture (Ref. 13). In
2009, two related incidents resulted in
49 individuals reporting rapid and acute
onset of gastrointestinal and
neurological symptoms after eating
meals at a restaurant in Lenexa, KS.
Investigations concluded that the
illnesses were caused by methomyl (an
insecticide) poisoning associated with
the consumption of salsa at the
restaurant. Two former employees of the
restaurant were found guilty of
intentionally contaminating the salsa
(Ref. 14).
A widespread incident of
economically motivated adulteration
occurred in China in 2008. Some
Chinese milk firms added melamine, a
nitrogen-rich industrial by-product, to
diluted dairy products to increase the
apparent protein content. This
adulteration resulted in significant
public health consequences, with more
than 290,000 ill infants and 6 deaths in
China. In addition, this incident caused
significant economic disruption within
the Chinese dairy industry, with
estimates approaching $3 billion in loss
to industry (Ref. 10, Ref. 11).
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
B. Interagency Approach to Food
Defense
1. Homeland Security Presidential
Directives and Presidential Policy
Directives for the Food and Agriculture
Sector
Intelligence gathered since the attacks
on the United States on September 11,
2001, indicates that terrorist
organizations have discussed
contamination of the food supply as a
means to harm U.S. citizens and disrupt
the global economy (Ref. 15). In
response, FDA, along with the Centers
for Disease Control and Prevention
(CDC), the United States Department of
Agriculture (USDA), the Department of
Homeland Security (DHS), the Federal
Bureau of Investigation (FBI), the
Environmental Protection Agency
(EPA), the Department of Defense, the
Department of Energy, the Department
of Commerce, and the Department of the
Interior, as well as with State, local,
tribal, territorial, and private sector
partners have coordinated efforts to
prevent, prepare for, and respond to
threats against the food supply. Many of
these efforts were accomplished in
accordance with applicable Homeland
Security Presidential Directives (HSPD),
specifically HSPD–7, HSPD–8, and
HSPD–9, and Presidential Policy
Directives (PPD), specifically PPD–8 and
PPD–21 (Ref. 16, Ref. 17, Ref. 18, Ref.
19, Ref. 20). In accordance with these
directives, FDA, USDA, DHS, State and
local governments and the food industry
collaborated to conduct vulnerability
assessments of a variety of products and
processes within the food and
agriculture sector.
2. The Evolution of Vulnerability
Assessments
Initially, FDA used Operational Risk
Management (ORM), which is a
vulnerability assessment methodology
that uses a six-step sequence of
identifying hazards and reducing the
potential for negative public health
consequences. The ORM process
resulted in three main outcomes: (1) A
calculation of risk by combining
assessments of severity and probability
of an attack on a specific food; (2)
calculations for specific contaminants
and specific food processes or related
activities; and (3) a categorization of
specific food/contaminant/food process
or related activity into a high, medium,
or low risk scheme.
At first, ORM-based assessments were
focused on reducing large public health
consequences of attacks on the food
supply. FDA realized that other
significant considerations (i.e., large
economic disruptions, public alarm,
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
78021
loss of confidence in the food supply,
and interruption of the food stream)
warranted incorporation into the
vulnerability assessment calculus. To
incorporate these considerations, FDA
and USDA’s Food Safety and Inspection
Service (FSIS) adapted a military
targeting tool known as CARVER to
assess vulnerabilities of the food and
agriculture sector. CARVER is an
acronym for the following six attributes
used to evaluate the attractiveness of a
target for attack:
• Criticality—measure of public
health and economic impacts of an
attack;
• Accessibility—ability to physically
access and egress from target;
• Recuperability—ability of a system
to recover from an attack;
• Vulnerability—ease of
accomplishing an attack;
• Effect—amount of direct loss from
an attack as measured by loss in
production; and
• Recognizability—ease of identifying
a target.
A seventh attribute, ‘‘Shock’’, was
added to the original six attributes to
assess the combined health, economic,
and psychological impacts of an attack
on the food industry. ORM and
CARVER+Shock assessment
conclusions were consistent; however,
the CARVER+Shock methodology
improved vulnerability assessment
efforts because its process allowed for
the identification and estimation of
economic and psychological impacts
throughout the food system.
In 2005, the Strategic Partnership
Program Agroterrorism (SPPA), a
public-private cooperative effort was
established by FDA, USDA, FBI, and
DHS, in partnership with State and
industry partners. The intent of the
SPPA Initiative was to collect the
necessary data to identify food and
agriculture sector-specific
vulnerabilities using the
CARVER+Shock method, develop
mitigation strategies, identify research
gaps, and increase coordination between
government and industry partners. The
SPPA initiative ran from 2005 to 2008,
resulting in vulnerability assessments of
36 food products and processes (Ref.
21). The SPPA Initiative was a
significant step towards identifying
vulnerabilities, mitigation strategies,
and research needs within the food and
agriculture industries. This initiative
also provided Federal, State, and local
government agencies with an in-depth
look at the vulnerabilities that may be
associated with the food and agriculture
industry, and helped enhance
communication among industry,
government, and law enforcement
E:\FR\FM\24DEP2.SGM
24DEP2
78022
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
stakeholders concerned with the
protection of the U.S. food supply.
Since the conclusion of the SPPA
Initiative, we have conducted additional
vulnerability assessments, which
continue to help inform our research
and policy.
C. Resources for the Food Sector
FDA has issued guidance documents
and developed other resources to assist
industry in their efforts to protect the
food supply against intentional
adulteration. In 2003, FDA issued five
guidance documents covering food
defense preventive measures for various
segments of the food and cosmetic
industry: (1) Guidance for Industry:
Food Producers, Processors, and
Transporters: Food Security Preventive
Measures Guidance (Ref. 22); (2)
Guidance for Industry: Importers and
Filers: Food Security Preventive
Measures Guidance (Ref. 23); (3)
Guidance for Industry: Dairy Farms,
Bulk Milk Transporters, Bulk Milk
Transfer Stations and Fluid Milk
Processors: Food Security Preventive
Measures Guidance (Ref. 24); (4) Retail
Food Stores and Food Service
Establishments: Food Security
Preventive Measures Guidance (Ref. 25);
and(5) Cosmetics Processors and
Transporters of Cosmetics Security
Preventive Measures Guidance (Ref. 26).
These guidance documents provide
FDA’s recommendations for best
practices in food defense, and describe
preventive measures that establishments
can take to minimize the risk of
intentional adulteration of food. We
updated the guidance documents in
2007 to include a self-assessment tool
that guides the user through an
assessment of recommended preventive
measures to identify those most
applicable to the facility.
FDA also has made available other
resources to help industry identify and
mitigate potential vulnerabilities for
intentional adulteration. These include:
• The ‘‘ALERT’’ program,
• The ‘‘Employees FIRST’’ training
tool,
• The ‘‘CARVER+Shock Vulnerability
Assessment’’ software tool,
• The ‘‘Mitigations Strategies
Database,’’
• The ‘‘Food Defense Plan Builder’’
software tool,
• The Food Related Emergency
Exercise Bundle, and
• The ‘‘Food Defense 101’’ training
courses.
We describe each briefly in this
section of the document.
The ALERT program, originally
released in 2006, is an educational
program intended to raise the awareness
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
of State and local governments and
industry regarding food defense (Ref.
27). ALERT identifies five key elements
that industry can use in food defense
planning:
• A—How do you ASSURE that the
supplies and ingredients you use are
from safe and secure sources?
• L—How do you LOOK after the
security of the products and ingredients
in your facility?
• E—What do you know about your
EMPLOYEES and people coming in and
out of your facility?
• R—Could you provide REPORTS
about the security of your products
while under your control?
• T—What do you do and who do
you notify if you have a THREAT or
issue at your facility, including
suspicious behavior?
Similarly, the Employees FIRST
educational tool, originally released in
2008, is a food defense awareness
training program for front-line food
industry workers about the risk of
intentional adulteration and the actions
they can take to identify and reduce
these risks (Ref. 28). This tool identifies
the following five key elements:
• F—Follow company food defense
plan and procedures;
• I—Inspect your work area and
surrounding areas;
• R—Recognize anything out of the
ordinary;
• S—Secure all ingredients, supplies,
and finished product; and
• T—Tell management if you notice
anything unusual or suspicious.
The CARVER+Shock Vulnerability
Assessment software tool, originally
released in 2007, helps users conduct
vulnerability assessments for their
establishments to identify and prioritize
the ‘‘critical nodes,’’ (also known as
critical process steps) the potential
targets vulnerable to intentional
adulteration attacks (Ref. 29). It guides
users through a series of questions to
determine the vulnerability of each of
the nodes within their facility. After the
vulnerabilities are identified, the
software helps users to identify
mitigation strategies for reducing the
risk of intentional adulteration. Using
the software tool, the user can focus
resources on protecting the most
susceptible points in their system.
The Mitigation Strategies Database
(MSD), originally released in 2011, is a
database of mitigation strategies that can
be applied to different steps in a food
operation to reduce the risk of
intentional adulteration (Ref. 30). The
database is searchable by key words and
processing steps common to agriculture
and food operations (e.g., growing,
harvesting, packing, manufacturing,
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
processing, and holding). See also the
discussion in section V.C.3 of this
document.
The Food Defense Plan Builder
(FDPB) software tool, released in 2013,
is a user-friendly computer software
program designed to assist owners and
operators of food facilities in developing
food defense plans for their facilities
(Ref. 31). In addition to providing new
functionality for food defense planning
and implementation, the FDPB software
tool harnesses our food defense
guidance documents, CARVER+Shock
Vulnerability Assessment software tool,
and the MSD into a single application.
The Food Related Emergency Exercise
Bundle (FREE–B), which FDA released
in 2011 and developed in collaboration
with CDC and FSIS and USDA’s Animal
and Plant Health Inspection Service
(APHIS), is a compilation of scenarios
based on both intentional and
unintentional food contamination
events. The FREE–B is designed to assist
the food industry, government
regulatory agencies, and public health
organizations in assessing existing food
emergency response plans, protocols,
and procedures (Ref. 32). The FREE–B
tool is designed to allow an individual
agency or industry entity to test its own
plans, protocols, and procedures
independently. Additionally, the tool
allows multiple jurisdictions and
organizations (e.g., medical community,
private sector, law enforcement, and
first responder communities) to jointly
conduct exercises. The tool is a set of
five scenarios, each of which contains a
Facilitator’s Guide, a Lead Planner’s
guide, and a Situation Manual.
Finally, our food defense training
courses, entitled ‘‘Food Defense 101’’
and released in 2013, reflect FDA’s
current thinking on how to minimize
the likelihood and impact of incidents
of intentional adulteration (Ref. 27).
Four courses integrated into one module
include: (1) Food Defense Awareness for
Professionals, (2) Food Defense
Awareness for Frontline Employees, (3)
FDA Regulations, and (4) ALERT for
owners and operators of food facilities.
The ALERT program is described
previously. The other programs are
described in section V.C.7 of this
document.
D. Outreach
We have conducted food defense
awareness outreach to international and
domestic stakeholders. Beginning in
2008, under the auspices of the AsiaPacific Economic Cooperation (APEC),
we collaborated with the U.S.
Department of State, USDA’s Foreign
Agricultural Service, and FSIS to launch
the Food Defense Pilot Program for the
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
APEC member countries. The Pilot
Program was developed with the intent
to implement the food defense
principles endorsed by the APEC
Counter Terrorism Task Force. The goal
of the program was to build and foster
global capacity to prevent and protect
against deliberate tampering and
intentional contamination of the food
supply through information sharing,
outreach, and technical assistance on
food defense, thereby safeguarding food
trade and public health across the APEC
member countries. In addition, to
support the international capacity
building goals of FSMA, we conducted
several workshops in various countries
to discuss topics such as increasing food
defense awareness, developing food
defense plans, conducting vulnerability
assessments, and implementing
mitigation strategies.
In 2013, we increased our domestic
outreach activities with a series of
workshops in the United States. Using
a similar format and agenda as the
international workshops, we conducted
1-day food defense awareness
workshops to provide industry, State
and local governments, and academic
partners with information on food
defense, and share tools and resources.
During these workshops, we shared
information on how to use the new
FDPB software tool to develop a
comprehensive food defense plan.
These workshops also served as a forum
to discuss food defense concerns,
understand industry’s current practices,
and share ideas for collaboration to
better protect the food supply against
intentional adulteration. We plan to
continue to hold additional workshops
in 2014.
E. Industry Standards
Guidelines accompanying industry
standards in the United States have
addressed intentional adulteration of
food. For example, the Global Food
Safety Initiative’s (GFSI) Guidance
Document Sixth Edition (Ref. 33)
addresses food defense. Some
organizations that own and manage
industry standards have worked or are
working to incorporate food defense
requirements into their standards to
meet this GFSI guideline. For example,
the Safe Quality Foods (SQF) Code,
edition 7.1, issued in 2013, is a process
and product certification standard that
specifies various food defense elements,
including that the methods,
responsibility, and criteria for
preventing food adulteration caused by
a deliberate act of sabotage or terroristlike incident shall be documented,
implemented and maintained (Ref. 34).
Another example of industry standards
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
that incorporate food defense elements
is the International Featured Standards
(IFS) Food Version 6 Standard, which
specifies that areas critical to security be
identified, food defense hazard analysis
and assessment of associated risks be
conducted annually or upon changes
that affect food integrity, and an
appropriate alert system be defined and
periodically tested for effectiveness (Ref.
35).
F. International Food Defense
Guidelines
In 2008, WHO issued its ‘‘Terrorist
Threats to Food—Guidelines for
Establishing and Strengthening
Prevention and Response Systems’’ to
provide policy guidance to its Member
States for integrating consideration of
deliberate acts of sabotage of food into
existing prevention and response
programs (Ref. 6). WHO uses the term
‘‘food terrorism’’ and defines it as ‘‘an
act or threat of deliberate contamination
of food for human consumption with
biological, chemical and physical agents
or radionuclear materials for the
purpose of causing injury or death to
civilian populations and/or disrupting
social, economic or political stability.’’
Focusing on the two key strategies of
prevention and response, WHO
recommends that all segments of the
food industry consider the development
of security and response plans for their
establishments, proportional to the
threat and their resources. The
guidelines state that the key to
preventing food terrorism is enhancing
existing food safety programs and
implementing reasonable security
measures on the basis of vulnerability
assessments. The guidelines further
state that the most vulnerable foods,
food ingredients, and food processes
should be identified, including: the
most readily accessible food processes;
foods that are most vulnerable to
undetected tampering; foods that are the
most widely disseminated or spread;
and the least supervised food
production areas and processes.
Other national governments,
including Australia, China, France,
Germany, and the United Kingdom, also
have issued guidelines to assist their
food industry stakeholders in protecting
food against intentional adulteration
(Ref. 5, Ref. 36, Ref. 37, Ref. 38, Ref. 39).
III. Legal Authority
FDA is proposing this regulation
under the FD&C Act as amended by
FSMA. Under sections 103 and 106 of
FSMA, FDA is proposing the
requirements applicable to the owner,
operator, or agent in charge of a facility
required to register under section 415 of
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
78023
the FD&C Act. Under section 106 of
FSMA, FDA is proposing the
requirements applicable to activities at
some facilities not covered by section
103 of FSMA (i.e., activities subject to
and in compliance with the juice and
seafood HACCP regulations in parts 120
and 123 (21 CFR parts 120 and 123) and
the manufacturing, processing, packing,
or holding of a dietary supplement in
compliance with certain requirements).
Under section 701(a) of the FD&C Act
(21 U.S.C. 371(a)), FDA is authorized to
issue regulations for the efficient
enforcement of the FD&C Act.
A. Section 103 of FSMA
Section 103 of FSMA, Hazard
Analysis and Risk-Based Preventive
Controls, amends the FD&C Act to
create a new section 418 that mandates
rulemaking. Section 418(n)(1)(A) of the
FD&C Act requires that the Secretary of
Health and Human Services issue
regulations ‘‘to establish science-based
minimum standards for conducting a
hazard analysis, documenting hazards,
implementing preventive controls, and
documenting the implementation of the
preventive controls . . ..’’ Section
418(n)(1)(B) of the FD&C Act requires
that the regulations define the terms
‘‘small business’’ and ‘‘very small
business,’’ taking into consideration the
study of the food processing sector
required by section 418(l)(5) of the
FD&C Act. Further, section 103(e) of
FSMA creates a new section 301(uu) in
the FD&C Act (21 U.S.C. 331(uu)) to
prohibit ‘‘[t]he operation of a facility
that manufactures, processes, packs, or
holds food for sale in the United States
if the owner, operator, or agent in charge
of such facility is not in compliance
with section 418 [of the FD&C Act].’’
In addition to rulemaking
requirements, section 418 of the FD&C
Act contains requirements applicable to
the owner, operator, or agent in charge
of a facility required to register under
section 415 of the FD&C Act. Section
418(a) of the FD&C Act is a general
provision that requires the owner,
operator, or agent in charge of a facility
to evaluate the hazards that could affect
food manufactured, processed, packed,
or held by the facility, identify and
implement preventive controls, monitor
the performance of those controls, and
maintain records of the monitoring. In
addition to the general requirements in
section 418(a) of the FD&C Act, sections
418(b) to (i) of the FD&C Act contain
more specific requirements applicable
to facilities, including several
provisions explicitly directed at
intentional adulteration. For example,
section 418(b)(2) of the FD&C Act
specifies that the owner, operator, or
E:\FR\FM\24DEP2.SGM
24DEP2
78024
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
agent in charge of a facility shall
identify and evaluate hazards that may
be intentionally introduced, including
by acts of terrorism. Section 418(c)(2) of
the FD&C Act specifies that the owner,
operator, or agent in charge of a facility
shall identify and implement preventive
controls to provide assurances that any
hazards that relate to intentional
adulteration will be significantly
minimized or prevented and addressed,
consistent with section 420 of the FD&C
Act. In sections IV and V of this
document, we discuss proposed
requirements (proposed subparts C and
D of part 121) that would implement
these provisions of section 418 of the
FD&C Act.
Sections 418(j) to (m) of the FD&C Act
and sections 103(c)(1)(D) and (g) of
FSMA provide authority for certain
exemptions and modifications to the
requirements of section 418 of the FD&C
Act. These include provisions related to
seafood and juice HACCP, and low-acid
canned food (section 418(j) of the FD&C
Act); activities of facilities subject to
section 419 of the FD&C Act (Standards
for Produce Safety) (section 418(k));
qualified facilities (section 418(l));
facilities that are solely engaged in the
production of food for animals other
than man, the storage of raw agricultural
commodities (other than fruits and
vegetables) intended for further
distribution or processing, or the storage
of packaged foods that are not exposed
to the environment (section 418(m));
facilities engaged only in certain lowrisk on-farm activities on certain foods
conducted by small or very small
businesses (section 103(c)(1)(D) of
FSMA), and dietary supplements
(section 103(g) of FSMA). In sections IV
and V of this document, we discuss the
related proposed provisions that would
implement these provisions of section
418 of the FD&C Act and section 103 of
FSMA.
B. Section 106 of FSMA
Section 106 of FSMA, Protection
Against Intentional Adulteration,
amends the FD&C Act to create a new
section 420, which mandates
rulemaking. Section 420 of the FD&C
Act requires FDA to issue regulations to
protect against the intentional
adulteration of food. Section 420(b)(1) of
the FD&C Act requires that such
regulations are to specify how a person
is to assess whether the person is
required to implement mitigation
strategies or measures intended to
protect against the intentional
adulteration of food. Section 420(b)(2) of
the FD&C Act requires that the
regulations specify appropriate
science—based mitigation strategies or
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
measures to prepare and protect the
food supply chain at specific vulnerable
points, as appropriate. Section 420(c) of
the FD&C Act provides that such
regulations are to apply only to food for
which there is a high risk of intentional
adulteration and for which such
intentional adulteration could cause
serious adverse health consequences or
death to humans or animals. Section
420(c)(1) provides that such foods are to
include those for which FDA has
identified clear vulnerabilities. Section
420(d) of the FD&C Act limits
applicability on farms to farms that
produce milk. Further, section 106(d) of
FSMA creates a new section 301(ww) in
the FD&C Act to prohibit ‘‘[t]he failure
to comply with section 420 [of the FD&C
Act].’’ We are proposing all of the
provisions under section 420 of the
FD&C Act.
C. Intrastate Activities
FDA tentatively concludes that the
provisions in the proposed rule should
be applicable to activities that are
intrastate in character. Facilities are
required to register under section 415 of
the FD&C Act regardless of whether the
food from the facility enters interstate
commerce (§ 1.225(b)). The plain
language of section 418 of the FD&C Act
applies to facilities that are required to
register under section 415 of the FD&C
Act (section 418(o)(2)) and does not
exclude a facility because food from
such a facility is not in interstate
commerce. Similarly, the plain language
of section 420 of the FD&C Act requires
FDA to issue regulations to protect
against the intentional adulteration of
food and does not include a limitation
to interstate commerce. Further, the
prohibited act provisions in sections
301(uu) and (ww) of the FD&C Act (21
U.S.C. 331(uu) and (ww)) do not require
an interstate commerce nexus. Notably,
other subsections in section 301 of the
FD&C Act, and section 304 of the FD&C
Act (21 U.S.C. 334) demonstrate that
Congress has included a specific
interstate commerce nexus in the
provisions of the FD&C Act when that
is its intent. Accordingly, it is
reasonable to interpret sections 418,
420, 301(uu) and (ww) of the FD&C Act
as not limiting the application of the
proposed rule only to those facilities
with a direct connection to interstate
commerce. However, we seek comment
on this interpretation and potential
alternatives.
IV. Regulatory Approach
A. Framework of the Rule
This proposed regulation implements
three provisions of FSMA that relate to
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
the intentional adulteration of food.
Section 103 of FSMA addresses
intentional adulteration in the context
of facilities that manufacture, process,
pack, or hold food and are required to
register under section 415 of the FD&C
Act. Section 105 of FSMA addresses
intentional adulteration in the context
of fruits and vegetables that are raw
agricultural commodities. Section 106 of
FSMA addresses intentional
adulteration in the context of high risk
foods and exempts farms except for
farms that produce milk.
1. Scope of Intentional Adulteration
Covered by this Rule
As noted in section I of this
document, acts of intentional
adulteration may take several forms,
including: (1) Acts of terrorism; (2) acts
of disgruntled employees, consumers, or
competitors; and (3) economically
motivated adulteration. With regard to
intentional adulteration from acts of
terrorism, we are proposing to require
certain facilities covered by this rule to
address significant vulnerabilities by
implementing focused mitigation
strategies at actionable process steps.
While we refer to the protection of the
food supply from ‘‘acts of terrorism’’
throughout this rule, we expect our
proposed approach and the proposed
implementation of focused mitigation
strategies would generally address acts
intended to cause massive public health
harm and, to a lesser extent, economic
disruption, whether committed by
terrorists, terrorist organizations,
individuals, or groups of individuals.
For the reasons described in section
IV.E of this document, we have
tentatively concluded not to propose
additional requirements for the
protection of food against intentional
adulteration caused by acts of
disgruntled employees, consumers, or
competitors. We describe our approach
to address economically motivated
adulteration in section IV.F of this
document, and seek comment on our
current thinking on this issue.
2. Identification of Key Activity Types
Terrorist attacks on the U.S. food
supply have been exceedingly rare.
However, vulnerability assessments
performed by FDA, USDA, DHS, and
FBI, under the SPPA Initiative (Ref. 21),
show that an attack could have
devastating public health and economic
consequences. Because such an attack is
a low probability but potentially
exceedingly high consequence event, we
have tentatively determined that
requirements should focus on those
facilities and process steps within those
facilities that pose the greatest risk. To
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
assess this risk, FDA and USDA, in
collaboration with DHS, FBI, and State
and local government and industry
partners, performed vulnerability
assessments using the CARVER+Shock
methodology. This methodology is
specifically tailored to assess the risk of
a terrorist attack and is different from an
assessment of risk posed by food safety
hazards (i.e., unintentional
adulteration).
As discussed in section V.C.2 of this
document, based on an analysis of the
vulnerability assessments that FDA has
conducted using the CARVER+Shock
methodology, we have identified four
key activity types: Bulk liquid receiving
and loading; Liquid storage and
handling; Secondary ingredient
handling; and Mixing and similar
activities. FDA has tentatively
determined that the presence of one or
more of these key activity types at a
process step (e.g., manufacturing,
processing, packing, or holding of food)
indicates a significant vulnerability
under section 418 of the FD&C Act and
that the food is at high risk of
intentional adulteration caused by acts
of terrorism under section 420 of the
FD&C Act. We seek comment on the
inclusion of these key activity types.
Designation of these key activity types
would serve two purposes. First, it
would provide a facility with a means
to assess whether it is required to
implement focused mitigation strategies
or measures intended to protect against
intentional adulteration under section
420(b)(1) of the FD&C Act. Second, it
would assist a facility subject to section
418 of the FD&C Act with the
performance of a hazard analysis to
identify and evaluate hazards that may
be intentionally introduced by acts of
terrorism, in accordance with section
418(b)(2).
Facilities would be able to determine
whether their operations involve one or
more of the key activity types or choose
to perform a vulnerability assessment.
Our experience is that the most
challenging part of developing a system
of controls for intentional adulteration
related to terrorism is identifying the
points in the food operation that are
most vulnerable to attack by performing
a vulnerability assessment. By using the
FDA-identified key activity types,
facilities would be able to concentrate
their efforts on the identification of
appropriate focused mitigation
strategies and the development and
implementation of the HACCP-type
system for ensuring that those strategies
are consistently and effectively
implemented.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
3. Requirement for a HACCP-Type
System of Controls
We have tentatively concluded that a
preventive controls approach like the
one we proposed for the systematic
control of food safety hazards in the PC
proposed rule is the most effective
means of ensuring that the focused
mitigation strategies are consistently
applied once the significant
vulnerabilities are identified and
appropriate focused mitigation
strategies are developed. The evolution
and advantages of this system, derived
from the HACCP methodology, is
discussed in detail in section II.C of the
PC proposed rule. The application of
HACCP-type controls for ensuring the
implementation of food defense
mitigation strategies is consistent with
the approach taken in Publicly
Available Specification (PAS) 96,
developed by the Centre for the
Protection of National Infrastructure in
collaboration with the British Standards
Institution, entitled ‘‘The Threat
Assessment Critical Control Point
(TACCP) Approach’’ (Ref. 5). It is also
consistent with WHO recommendations
on protection against intentional
adulteration (Ref. 6). We request
comment on the appropriateness of a
HACCP-type system to ensure that
mitigation strategies designed to
significantly minimize or prevent
intentional adulteration related to
terrorism and whether there are
approaches that would be more suitable.
Section 418 of the FD&C Act exempts
several kinds of activities (e.g., those
related to seafood, juice, dietary
supplements, low-acid canned food [for
certain microbiological hazards]). These
activities are subject to preventive
control-type regulations that address
food safety, but not food defense,
concerns. Section 420 of the FD&C Act
instructs FDA to issue regulations to
require that science-based mitigation
strategies or measures be applied to
foods that are at high risk of intentional
adulteration. The exemptions set out in
section 418 of the FD&C Act are not
applicable to the provisions of section
420 of the FD&C Act. We also have
tentatively determined that some
activities that are not subject to section
418 of the FD&C Act that involve
manufacturing, processing, packing, or
holding of food are likely to involve one
of the key activity types (e.g., juice
manufacturing, breaded seafood
manufacturing, and mixing activity in a
low-acid canned food process). Based
on our tentative conclusion that the
HACCP-type system in section 418 of
the FD&C Act is generally appropriate
for application to intentional
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
78025
adulteration related to terrorism, this
same system would be required for
these activities. Applying the same
regulatory framework under sections
418 and 420 of the FD&C Act would
facilitate a concise and consistent
approach to protection against
intentional adulteration of food and the
efficient enforcement of the
requirements. Further, this approach
would be consistent with the approach
for unintentional adulteration that many
of these facilities (those subject to
section 418 of the FD&C Act relative to
the control of food safety hazards)
would already be required to take for
unintentional hazards under the PC
proposed rule.
We acknowledge that regulation of
entities in the food production system
(in this case, facilities) to reduce the risk
of intentional adulteration of food
caused by acts of terrorism is,
essentially, without precedent. Such an
endeavor is further complicated by the
low probability and potentially high
impact nature of such an attack which
makes estimating potential public
health benefits and establishing an
appropriate threshold for requiring
action difficult. We are further
challenged by the paucity of data on the
extent to which facilities have already
implemented programs to mitigate this
risk, and the effectiveness of various
strategies to prevent intentional
adulteration of food caused by acts of
terrorism.
In developing this proposed rule we
have relied on our experience in both
implementing preventive control
schemes targeting unintentional food
safety hazards as well as working with
the U.S. intelligence community on the
threat of a terrorist attack on the food
and agriculture sector, including
performing vulnerability assessments
and developing guidance for industry.
While these activities have provided us
with a useful foundation on which to
develop this proposed rule, the
challenges described previously remain.
We request comment on our proposed
approach, including on the following
issues:
• From which entities would
implementation of measures to protect
against intentional adulteration derive
the greatest benefit to public health
protection? How could this proposed
regulation be modified to better target
such entities?
• Would it be feasible to require
measures to protect against intentional
adulteration only in the event of a
credible threat? If so, would such an
approach be consistent with the
intentional adulteration provisions of
FSMA? How would such requirements
E:\FR\FM\24DEP2.SGM
24DEP2
78026
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
be communicated to industry in a
timely and actionable manner?
• What is an appropriate level of
public health protection with respect to
intentional adulteration, considering the
intentional adulteration provisions of
FSMA?
• Are there other ways to further
focus the scope of the rule (see also
section IV.I of this document)?
4. Compliance Dates
Section 103(i)(1) of FSMA, General
Rule, provides that ‘‘[t]he amendments
made by this section shall take effect 18
months after the date of enactment’’
(i.e., by July 4, 2012). Section 103(i)(2)
of FSMA, Flexibility for Small
Businesses, provides that
‘‘[n]otwithstanding paragraph (1),’’ the
amendments made by this section ‘‘shall
apply’’ to a small business and very
small business beginning on the date
that are 6 months and 18 months,
respectively, ‘‘after the effective date’’ of
FDA’s final regulation. Section 106 of
FSMA does not contain similar
language. FDA is implementing the
amendments made by sections 103 and
106 of FSMA to the FD&C Act, as they
relate to intentional adulteration,
through this rulemaking.
We have tentatively concluded that it
is appropriate to provide a sufficient
time period following publication of the
final regulation for facilities to come
into compliance with proposed part
121. FDA recognizes that it can take
time to develop and implement a food
defense plan that would require, among
other things, identification of actionable
process steps, implementation of
focused mitigation strategies, and
monitoring of focused mitigation
strategies.
FDA is proposing that the final rule
would be effective 60 days after
publication in the Federal Register,
with staggered compliance dates,
consistent with the proposed effective
dates in the PC proposed rule and
Produce Safety proposed rule. Similarly,
we recognize that businesses of all sizes
may need more time to comply with the
new requirements established under
FSMA. As noted in section VII of the PC
proposed rule, FDA believes that it is
reasonable to allow for 1 year after the
date of publication of the final rule for
businesses other than small and very
small businesses to come into
compliance with the new requirements
established under FSMA. FDA also
believes that it is reasonable to allow for
2 years after the date of publication of
the final rule for small businesses to
come into compliance with the new
requirements established under FSMA,
and 3 years after the date of publication
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
of the final rule for very small
businesses to come into compliance
with the new requirements established
under FSMA.
Therefore, as proposed, facilities,
other than small and very small
businesses, that are subject to part 121
would have 1 year after the effective
date to comply with proposed part 121.
Small businesses would have 2 years
after the effective date to comply with
proposed part 121 (see section V.A of
this document for a discussion of the
proposed definition of a ‘‘small
business’’). With respect to very small
businesses, we are proposing to exempt
qualified facilities, which include very
small businesses, from the requirements
of proposed part 121, except that such
facilities must, upon request, provide
for official review documentation that
was relied upon to demonstrate that the
facility meets this exemption. Very
small businesses then would have 3
years after the effective date to comply
with proposed § 121.5(a). FDA intends
to work closely with the food industry,
extension and education organizations,
and State partners to develop any
necessary additional tools and training
programs needed to facilitate
implementation of this rule.
B. Activities That Occur on Produce
Farms
Section 419 of the FD&C Act requires
FDA to issue regulations to establish
science-based minimum standards for
the safe production and harvesting of
fruits and vegetables. In developing
these regulations, the Act requires us to
consider, among others, those hazards
that may be intentionally introduced,
including by acts of terrorism (section
419(a)(3)(C) and (c)(1)(A) of the FD&C
Act). Note that neither section 418 of the
FD&C Act nor section 420 of the FD&C
Act apply to these activities. Section
420 of the FD&C Act specifically
exempts farms, except those that
produce milk, and section 418 of the
FD&C Act exempts activities of facilities
subject to section 419 of the FD&C Act.
In implementing section 419 of the
FD&C Act, we considered the risks
posed by a terrorist attack on the kinds
of activities that occur on produce
farms. We considered those activities
that fall within the definition of ‘‘farm’’
(as defined in 21 CFR 1.227) (e.g.,
planting, tilling, irrigating, treating with
pesticides, harvesting, drying for
purposes of storing or transporting,
hydro-cooling, packing, refrigerating,
waxing, shelling, sifting, removing
leaves, stems and husks, culling,
shelling, and washing). We utilized data
gathered from vulnerability assessments
that we conducted employing the
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
CARVER+Shock methodology, and
evaluated whether activities that occur
on produce farms pose significant
vulnerabilities (Ref. 40).
Our evaluation found that activities
that are typically performed on produce
farms are at relatively low risk for
intentional adulteration of food from
acts of terrorism (Ref. 40). Based on this
evaluation, we have tentatively
concluded that requirements for
produce farms are not necessary to
minimize the risk of serious adverse
health consequences or death from this
type of adulteration. Further, we have
tentatively concluded that requirements
relating to this form of adulteration are
not reasonably necessary to prevent the
introduction of known or reasonably
foreseeable hazards and to provide
reasonable assurances that the produce
is not adulterated under section 402 of
the FD&C Act. For these reasons, we are
not proposing requirements for produce
farms to specifically address intentional
adulteration related to terrorism. We
seek comment on this tentative
conclusion and our analysis that
informed this tentative decision.
We acknowledge that there may be
activities that occur on produce farms
for which we are not proposing
requirements that are similar to off-farm
activities for which we are proposing to
require the implementation of focused
mitigation strategies. However, there are
aspects of the specific on-farm activities
that minimize the risk for intentional
adulteration caused by acts of terrorism.
For example, waxing is an on-farm
activity that is similar to coating and
that fits within one of the key activity
types. However, there are key
differences that make an on-farm
waxing operation less vulnerable
compared to a coating operation. With
waxing, there is difficulty of mixing a
contaminant into a clear, heated wax in
a tank in close proximity to the busy
packing line in an on-farm packing
house. Conversely, a coating operation
involves an opaque, ambient or
refrigerated, aqueous coating mix in a
tank and occurs in a relatively isolated
part of the manufacturing plant. In
addition, the uncertainty about whether
the produce leaving the farm is destined
for direct consumption or for further
processing, such as removal of the wax,
which could inactivate or remove any
contaminant intentionally added, makes
it a relatively less likely target for
intentional adulteration.
C. Transportation Carriers
One of the key activity types that we
have tentatively determined indicates a
significant vulnerability to intentional
adulteration caused by acts of terrorism
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
is Bulk liquid receiving and loading. As
proposed, receiving and loading of other
types of foods (e.g., non-bulk liquids,
solid foods, gaseous foods) are not
identified as key activity types because
we determined that they do not present
this same level of risk. By requiring that
shippers and receivers of bulk liquids
implement focused mitigation strategies
at actionable process steps involving
this key activity, as proposed in
§ 121.135(a), we expect that shippers
and receivers will institute focused
mitigation strategies that will
significantly minimize or prevent the
potential for intention adulteration of
these foods during transportation. Such
mitigation strategies may include
sealing or locking outbound
conveyances of bulk liquid, or requiring
that inbound conveyances be sealed or
locked as a condition of receipt of the
bulk liquid. Where such measures are
implemented by the shippers and
receivers of bulk liquids, we have
tentatively concluded that the food
would be sufficiently protected from
intentional adulteration caused by acts
of terrorism, and that no further actions
by a carrier would be needed to ensure
the safety of the food. For this reason,
we are not proposing to cover
transportation carriers in this proposed
rule. We request comment on our
analysis of this issue, and our tentative
conclusion.
Note that FDA will issue a proposed
rule in the near future related to
transportation carriers and sanitary
transportation practices.
sroberts on DSK5SPTVN1PROD with PROPOSALS
D. Food for Animals
As discussed in section V.B.6 of this
document, we are proposing to exempt
the manufacturing, processing, packing,
and holding of animal food from this
proposed regulation with respect to
intentional adulteration caused by acts
of terrorism.
E. Acts of Disgruntled Employees,
Consumers, or Competitors
While the goals and outcomes of acts
of disgruntled employees, consumers or
competitors can overlap with acts of
terrorism, generally, the distinction has
to do with differences in scale.
Disgruntled employees are generally
understood to be interested primarily in
attacking the reputation of the company,
and otherwise have little interest in
public health harm. On the other hand,
terrorist organizations are generally
understood to be interested in
maximizing public health harm and, to
a lesser extent, economic disruption
(Ref. 5, Ref. 6).
Section 420(c) of the FD&C Act
requires that the regulation prepared
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
under that section apply to ‘‘food for
which there is a high risk of intentional
contamination.’’ In the spectrum of risk
associated with intentional adulteration
of food, attacks perpetrated by terrorist
organizations intent on causing massive
casualties and, to a lesser extent,
economic disruption would be ranked
as relatively high risk. On the other
hand, attacks by disgruntled employees,
consumers, or competitors would be
consistently ranked as relatively low
risk; although these events occur
annually, their public health and
economic impact would be generally
quite small. In general, the target food
and the point in its production are those
of convenience (i.e., a point to which
the employee, consumer, or competitor
has ready access). Should a disgruntled
employee, consumer, or competitor
choose to attack at an actionable process
step, where the adverse public health
and economic consequences could be
greater, the provisions of this proposed
rule would be effective in minimizing
the opportunity for success. Actions
taken to mitigate the potential for a
terrorist attack against the food supply
are likely to have collateral benefits in
reducing the potential for an attack by
a disgruntled employee, consumer, or
competitor (as well as on other security
related issues, such as theft and
vandalism). As a practical matter,
hardening the food supply (i.e.,
reducing the opportunity for attack) to
attacks by disgruntled employees,
consumers, or competitors could require
taking steps at many more points in the
food system than would be required to
harden the food supply to minimize the
potential for terrorist attack. We have
tentatively concluded that the latter can
be accomplished by focusing on those
points in the food system where an
attack would be expected to cause
massive adverse public health impact,
and, to a lesser extent, economic
disruption.
F. Economically Motivated Adulteration
Efforts to protect against intentional
adulteration require a shift in
perspective from that applied to
traditional food safety. In the PC,
Animal Food PC, and Produce Safety
proposed rules, we tentatively
concluded that hazards associated with
intentional adulteration, which are not
addressed in traditional HACCP or other
food safety systems, likely will require
different kinds of controls, and would
be best addressed in a separate
rulemaking (this proposed rule).
However, we also explained how in
some circumstances economically
motivated adulteration could be viewed
as reasonably likely to occur. Further,
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
78027
we requested comment on where to
address those hazards that may be
intentionally introduced for economic
gain. After additional consideration, we
present our current thinking in this
section of the document.
For facilities subject to section 418 of
the FD&C Act, we have tentatively
concluded that economically motivated
adulteration would be best addressed
under the regulatory regime described
in the PC and Animal Food PC proposed
rules and thus best addressed in those
rulemakings. Before we decide to
finalize provisions on economically
motivated adulteration in the PC and
Animal Food PC final rules, FDA plans
to provide new language and an analysis
of costs associated with these
provisions, and seek comment. Under
this approach, the owner, operator, or
agent in charge of a covered facility
would be required to perform a hazard
analysis to identify those hazards
related to economically motivated
adulteration that are reasonably likely to
occur. Economically motivated
adulteration could be reasonably likely
to occur, for example, when obtaining
certain ingredients from a country in
which economically motivated
adulteration has occurred in those
ingredients in the past. Because of past
incidents regarding the addition of
melamine to certain food products
apparently to enhance perceived quality
and/or protein content, even if there is
no known history regarding the specific
supplier or the specific food product, a
prudent person would implement
preventive controls to address the
potential presence of this hazard in a
food. The goal of the perpetrator of
economically motivated adulteration is
for the adulterant to be undetected in
the product, so that the perpetrator can
continue to obtain the desired economic
benefits (Ref. 7, Ref. 9). Accordingly,
unlike with acts of terrorism, such
occurrences of economic adulteration
are expected to be long term, and would
not be appropriately viewed as a rare
occurrence, but rather as reasonably
likely to occur.
We have tentatively concluded that
this hazard-analysis type approach is
better suited to address economically
motivated adulteration than the
vulnerability assessment-type approach
we are proposing to address intentional
adulteration related to terrorism. In the
latter approach, which we are not
proposing, significant vulnerabilities
would be identified based either on the
presence of key activity types (which
reflect FDA-conducted vulnerability
assessments) or facility-specific
vulnerability assessments. Under a
vulnerability assessment-type approach,
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78028
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
the assessment would need to consider
the degree to which a food is a likely
target for economically motivated
adulteration based on the attributes of
the food (such as the nature of the food,
its production system, and its supply
chain) and the capabilities of a
perpetrator (such as availability and
access to adulterants that can be readily
disguised and undetected by currently
accepted testing methods). Factors to
consider could include previous
occurrences of economically motivated
adulteration; a highly complex supply
chain; sudden changes in commodity
prices; known inadequacies in
identification and assay testing methods
for potential adulterants; a highly
complex and variable food ingredient;
the widespread availability of a
potential adulterant; the lack of
organoleptic properties of a potential
adulterant; the high cost or scarcity of
an ingredient; and variation in the value
of a food based on variations in levels
of a high value attribute of that food.
The nature of economically motivated
adulteration makes it difficult to
identify all relevant factors to be
considered in a vulnerability assessment
to predict when novel events of
economic adulteration are expected to
occur. Moreover, predictive tools such
as CARVER+Shock are not currently
configured to assess the risk of
economically motivated adulteration,
nor have extensive vulnerability
assessments for economically motivated
adulteration in food products been
conducted by FDA or others. Therefore,
we believe the most appropriate
framework to assess the risk of
economically motivated adulteration is
to consider whether it is reasonably
likely to occur (such as whether it has
occurred under similar circumstances
with some regularity in the past) as part
of a hazard analysis.
Under this approach, facilities subject
to section 418 of the FD&C Act would
be expected to implement controls
against economically motivated
adulteration under circumstances where
there has been a pattern of such
adulteration in the past, even though the
past occurrences may not be associated
with the specific supplier or the specific
food product but the pattern suggests a
potential for intentional adulteration.
Further, a system of monitoring,
corrective action, verification, and
recordkeeping that is similar to those in
the PC and Animal Food PC proposed
rules would be appropriate for
economically motivated adulteration. In
addition, the elements of a preventive
control system, including hazard
analysis, preventive controls,
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
monitoring, corrective actions,
verification, and recordkeeping would
be documented in a food safety plan
that would include control of
economically motivated adulteration.
We believe that addressing both of these
potential sources for contamination
within the same framework is likely to
streamline requirements and reduce
costs to industry.
We seek comment on our tentative
conclusions presented above.
Specifically, we are interested in
information on the specific factors that
are most relevant for determining
whether economically motivated
adulteration is reasonably likely to
occur, particularly in instances where
the specific product or supplier has not
been previously associated with such
adulteration. In addition, we seek
comment on whether and how these
relevant factors may be used to develop
appropriate predictive tools or establish
a standard for when preventive controls
are necessary.
Section 418 of the FD&C Act contains
certain exemptions related to
compliance with FDA’s seafood and
juice HACCP regulations and with
regard to manufacturing, processing,
packing or holding dietary supplements
that are in compliance with the
requirements of sections 402(g)(2) and
761 of the FD&C Act. Section 420 of the
FD&C Act does not contain these
exemptions and requires FDA to issue
regulations to protect against the
intentional adulteration of food. Seafood
and juice are currently subject to
HACCP-type regulations in §§ 123 and
120, respectively, and our current
thinking is that under section 420
economically motivated adulteration
could be addressed through the existing
frameworks for these foods. Under this
option, FDA would amend the seafood
and juice HACCP regulations to specify
that economically motivated
adulteration is a hazard that must be
considered in a hazard analysis of these
foods, and addressed in a HACCP plan.
For example, for seafood, we could
propose to add ‘‘economically
motivated adulteration that could result
in serious adverse health consequences
or death’’ to the list of hazards to be
considered in a hazard analysis in
accordance with § 123.6(c)(1). Similarly,
for juice we could propose to add
‘‘economically motivated adulteration
that could result in serious adverse
health consequences or death’’ to the
list of hazards to be considered in a
hazard analysis in accordance with
§ 120.7(c). Also under this option, FDA
would consider proposing to amend
part 111 (21 CFR part 111), the Dietary
Supplements current good
PO 00000
Frm 00016
Fmt 4701
Sfmt 4702
manufacturing practice (CGMP) rule, to
include economically motivated
adulteration that could result in serious
adverse health consequences or death.
Current § 111.70(b) and (c) require
establishing component specifications
and in-process specifications to ensure
the identity, purity, strength, and
composition of the dietary supplement,
and we could amend these provisions to
cover economically motivated
adulteration that could result in serious
adverse health consequences or death.
We have also tentatively concluded
not to require produce farms subject to
section 419 of the FD&C Act and farms
that produce milk (also referred to in
this document as ‘‘dairy farms’’) subject
to section 420 of the FD&C Act to take
measures to address economically
motivated adulteration. With regard to
produce farms subject to section 419 of
the FD&C Act, we have tentatively
concluded that there are not procedures,
processes, or practices that are
reasonably necessary to be implemented
by these entities to prevent the
introduction of known or reasonably
foreseeable biological, chemical, or
physical hazards that can cause serious
adverse health consequences or death as
a result of economically motivated
adulteration. With regard to farms that
produce milk subject to section 420 of
the FD&C Act, we have tentatively
concluded that there are not appropriate
science-based strategies or measures
intended to protect against
economically motivated adulteration
that can be applied at the farm. These
tentative conclusions are based on our
assessment that preventive controls for
economically motivated adulteration are
suitable to address such adulteration
when it is perpetrated by the entity’s
supplier, but not when it is perpetrated
by the entity itself, as would be the case
for economically motivated adulteration
at a produce farm or a farm that
produces milk. Actions such as auditing
of suppliers or reliance upon suppliersupplied test results or production
control records are generally considered
unsuitable to address economically
motivated adulteration where the
supplier, if intentionally adulterating
the food, would already be violating the
law and would be able to subvert these
controls. For both types of farms, we are
not aware of inputs into the growing,
harvesting, packing, or holding of
produce or milk (i.e., within our farm
definition) that could be subject to
economically motivated adulteration
that could cause serious adverse health
consequences or death under sections
419 and 420 of the FD&C Act. We seek
comment on this tentative conclusion.
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
G. Low-Risk Activities at Farm MixedType Facilities
Section 103(c)(1)(C) of FSMA directs
the Secretary of Health and Human
Services to conduct a science-based risk
analysis as part of the section 103(c)
rulemaking. The science-based risk
analysis is to cover ‘‘(i) specific types of
on-farm packing or holding of food that
is not grown, raised, or consumed on
such farm or another farm under the
same ownership, as such packing and
holding relates to specific foods; and (ii)
specific on-farm manufacturing and
processing activities as such activities
relate to specific foods that are not
consumed on that farm or on another
farm under common ownership.’’ In
section VIII.G of the PC proposed rule,
we describe a draft Qualitative Risk
Assessment (the draft RA) we performed
to satisfy this requirement. Section
103(c)(1)(D)(i) of FSMA requires FDA to
use the results of this analysis to
establish exemptions and inspection
frequencies, or modify requirements, for
facilities engaged only in specific types
of on-farm activities that FDA
determines to be low risk.
Elsewhere in this issue of the Federal
Register, FDA is publishing a notice
announcing the availability for public
comment Appendix 4 to the draft RA
(the draft RA Appendix). The purpose of
the draft RA Appendix is to provide a
science-based risk analysis of those
foods whose production processes
would be considered low risk with
respect to the risk of intentional
adulteration caused by acts of terrorism.
FDA conducted this evaluation to
satisfy the requirement in Section
103(c)(1)(C) of FSMA to conduct a
science-based risk analysis with respect
to the risk of intentional adulteration
caused by acts of terrorism. We
evaluated the production processes for
the types of finished foods we expect
are produced at farm mixed-type
facilities to determine whether or not
they are low-risk with respect to hazards
that may be intentionally introduced by
acts of terrorism. For the purposes of
this analysis, we evaluated whether a
production process involved any of the
four FDA-identified key activity types,
and identified a production process that
did not involve any of the four key
activity types as a ‘‘low risk production
process.’’ Based on this evaluation, we
concluded that the production processes
for the following finished foods are
‘‘low-risk’’:
• Eggs (In-Shell)
• Fruits & Vegetables Other Than
Pods, Seeds for Direct Consumption,
and Hesperidia (Fresh, Intact)
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
• Game Meats (Whole or Cut, Not
Ground or Shredded, Without
Secondary Ingredients)
• Peanuts & Tree Nuts (Raw, In-Shell)
• Sugarcane & Sugar Beets (Fresh,
Intact)
We are considering the results of this
analysis in determining any specific
exemptions or modified requirements.
We request comment on whether we
should exempt on-farm manufacturing,
processing, packing, or holding of the
foods identified as having low-risk
production practices when conducted
by a small or very small business if such
activities are the only activities
conducted by the business that are
subject to section 418 of the FD&C Act.
If we were to take this approach, only
facilities meeting all of the specified
criteria would be exempt as a result of
being engaged in low-risk activities.
Thus, a facility located on-farm, that is
a small or very small business, and only
produces fresh, intact apples as a
finished product (e.g., by packing apples
grown on a different farm that is under
different ownership) would be exempt
from this proposed rule. On the other
hand, an apple-packing facility that is
off-farm would not be exempt, an apple
packing facility that is on-farm but that
is not a small or very small business
would not be exempt, and an apple
packing facility that also packs green
beans would not be exempt. We request
comment on whether we should
broaden this potential exemption in any
way, such as by removing certain of the
restrictions mentioned immediately
above. We also seek comment on
whether we should instead establish
modified requirements for facilities that
produce foods identified as having lowrisk production processes, and if so,
what those modified requirements
should be and the scope of application
of the modified requirements. In
addition, we seek comment on whether
and how we should consider the results
of this analysis in determining whether
to exempt or modify the inspections
frequency requirements under Section
421 of the FD&C Act, Targeting of
Inspection Resources for Domestic
Facilities.
H. Activities That Occur on Dairy Farms
1. Assessment of Vulnerabilities
Under section 420 of the FD&C Act,
we considered whether activities that
occur on farms that produce milk pose
a high risk for intentional adulteration
of food caused by acts of terrorism that
could cause significant adverse health
consequences or death. A preliminary
evaluation indicates that fluid milk
storage appears to fit within the key
PO 00000
Frm 00017
Fmt 4701
Sfmt 4702
78029
activity type, Liquid storage and
handling, and fluid milk loading
appears to fit within the key activity
type, Bulk liquid receiving and holding.
The fluid milk storage tank is one of the
actionable process steps that would be
applicable to both of these activities on
a dairy farm.
As discussed in section V.C.2 of this
document, FDA is proposing to require
that the owner, operator, or agent in
charge of a facility that has one or more
of the FDA-identified key activity types
identify actionable process steps for
those key activity types and implement
focused mitigation strategies at any
actionable process steps. Because dairy
farms generally are not facilities as
defined in this rule, they would not be
subject to this requirement. However,
section 420 is applicable to dairy farms
(see § 420(d)) and fluid milk storage and
loading in a dairy farm operation appear
to pose a significant vulnerability.
The risk posed by intentional
adulteration of milk on-farm results
from a number of factors: (1) The system
of milk collection from farms and
subsequent holding and processing
serves to distribute contaminants added
to the milk on the farm into much larger
quantities of fluid milk, increasing the
potential magnitude of an intentional
adulteration event; (2) in its fluid form
milk has a short shelf life, increasing the
potential for significant adverse public
health impacts before detection and,
once detected, before a public health
intervention can be implemented; (3)
fluid milk is widely consumed across
different sub-populations, including
infants and children, increasing the
potential for significant adverse public
health impacts and, because of public
reaction to child and infant morbidity
and mortality, decreasing public
confidence in the food supply; (4) fluid
milk is consumed in a variety of food
forms, including as a beverage (finished
food) and as an ingredient in other
finished foods, complicating public
health intervention; and (5) milk storage
tanks are commonly left unlocked (Ref.
41, Ref. 42, Ref. 43, Ref. 44, Ref. 45, Ref.
46, Ref. 47).
2. Mitigation Strategies
Farms are not subject to the HACCPtype system of preventive controls
prescribed in section 418 of the FD&C
Act, and our current thinking is that,
should we include requirements relative
to dairy farms in the final rule, we
would not require HACCP-type controls
for dairy farms under section 420 of the
FD&C Act. Similarly, under section 419
of the FD&C Act we did not propose to
apply such an approach to
unintentional adulteration on produce
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78030
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
farms in the Produce Safety proposed
rule (see section IV.D of the Produce
Safety proposed rule). Rather, as with
produce farms, a more appropriate
approach might be a CGMP-type
provision that relates directly to the
significant vulnerability. Generally,
CGMPs set out mandatory, broad,
generally applicable practices and
conditions that are required to be met,
and the criteria and definitions that are
applicable in determining whether the
food is adulterated. For example, a
CGMP approach would identify the
broad, generally applicable mitigation
strategies that dairy farm operators must
implement (e.g., limiting access to fluid
milk storage tanks), without specifying
how that strategy must be accomplished
and without a further requirement for
monitoring, recordkeeping or the
development of a plan. We seek
comment on this approach.
FDA previously provided guidance
for the dairy industry, including dairy
farms, on the potential for intentional
contamination and identified the types
of food defense measures that dairy
farms may take to minimize the risk that
fluid milk under their control will be
subject to tampering or other malicious,
criminal, or terrorist actions (Ref. 24).
Among other recommendations, FDA’s
guidance recommends ‘‘limiting access’’
to raw and pasteurized milk storage as
a food defense preventive measure. We
acknowledge the difficulties involved in
limiting access to many dairy farms,
including multiple entries to the milk
house, multiple visitors with customary
access to the milk house (e.g., State food
safety inspectors, vendors delivering
veterinary medications, and drivers
collecting bulk milk for transport to
processing and storage facilities);
continuous milk piping from the
milking parlor to the bulk milk tank,
providing for access points to the bulk
milk tank from outside the milk house;
open access to the milking parlor for
workers and cows; and automated
milking operations where employees are
not necessarily present to escort cows
into the milking parlor.
In light of these circumstances, we
request comment on whether and how
access to the bulk milk storage tank and
associated systems can be limited, and
the costs and other implications of
doing so. In addition, we are interested
in comment on whether and what types
of focused mitigation strategies or other
measures are currently employed by
dairy farms. Specifically for fluid milk
storage tanks, we seek comment on
whether and what focused mitigation
strategies would be appropriate and
feasible given current dairy farming
practices.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
We also seek comment on whether it
would be more appropriate for FDA to
require that dairy farm operators receive
food defense awareness training rather
than requiring that they implement
focused mitigation strategies to limit
access to certain steps of their operation.
If you support an approach based on
training rather than mandated focused
mitigation strategies, we are further
interested in how such an approach
would work at those farms where an
agent of the farm may not be present at
all times, given that a system based on
awareness training is premised on the
assumption that such training would
provide the operator with the tools to
report and respond to suspicious
activity that they observe.
3. Scope of Dairy Farms Subject to any
Requirement
Finally, we seek comment on the
scope of farms that produce milk that
should be subject to any requirements
that we may establish in a final rule. For
example, the scope of dairy farms
covered could be determined based on
the potential for adverse public health
outcome resulting from consumption of
milk produced at a farm, if a
contaminant were intentionally
introduced into the milk from that farm.
Farms with less than 50 milk-producing
cows contribute a relatively small
proportion to the total volume of milk
produced in the United States (i.e.,
approximately 4.2 percent of total milk
produced in the United States), and the
current trend in the dairy farm industry
toward consolidation (Ref. 48) likely
further reduces the percentage of
production that such farms will
contribute in the future. However, milk
from even very small dairy farms may
be pooled with milk from other farms in
raw milk storage tanks at milk
processing and storage facilities,
potentially resulting in a public health
impact from intentional adulteration
that is disproportionate to the size of the
farm or its contribution to the milk
supply. We request comment on the
appropriateness of determining the
scope of dairy farms covered based on
the number of cows on a farm.
Alternatively, should we consider
excluding farms based on how the milk
from a farm is distributed (e.g., direct
sale to consumers or other end users;
pooling with milk from other farms;
supplied to the Grade A Milk system for
the production of fluid milk; or used in
the production of cheese and other
products that have a different risk
associated with intentional adulteration
caused by acts of terrorism)?
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
I. Other Ways to Focus on Foods With
a High Risk of Intentional Adulteration
Caused by Terrorism
We are requesting comment on
whether, under section 420 of the FD&C
Act, there are other ways in which the
coverage of this proposed regulation can
be further focused on foods that present
a high risk of intentional adulteration
caused by acts of terrorism. For
example, are there ways in which a
food’s shelf life, turnover in the
marketplace, batch size, serving size and
servings per batch, distribution and
consumption patterns, and intended
consumer could be considered in
providing for an exemption or in setting
modified requirements for that food.
Ordinarily, these considerations are part
of a vulnerability assessment, and in
such assessments the risk reduction
aspects of one attribute may be offset or
exacerbated by those of another
attribute, and may be very facilityspecific. Such attributes specific to the
food(s) manufactured, processed,
packed, or held at the facility can be
taken into account, should a facility
choose to perform its own vulnerability
assessment and assign actionable
process steps, as provided for in
proposed § 121.130(b). However, as
discussed in section V.C.2 of this
document, facilities would not be
required to perform a facility-specific
vulnerability assessment and, instead,
would have the option of identifying
actionable process steps using the
procedure in proposed § 121.130(a). We
are particularly interested in how foodspecific attributes can be taken into
account in the absence of a general
requirement for a facility-specific
vulnerability assessment.
V. The Proposal
A. Definitions
In subpart A of proposed part 121,
under § 121.3, FDA is proposing the
following definitions and
interpretations of terms relevant to
proposed part 121. The definitions and
interpretations of terms in section 201 of
the FD&C Act (21 U.S.C. 321) are
applicable to such terms when used in
this part. As proposed, several terms in
part 121 have the same definitions as in
proposed part 117 and, therefore, we
have not included an extensive
discussion of those terms in this
proposed rule. See section X.B of the PC
proposed rule for a discussion of the
following terms: facility, farm, holding,
manufacturing/processing, mixed-type
facility, packing, qualified end-user,
qualified facility, and small business.
FDA is proposing to define the term
‘‘actionable process step’’ to mean a
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
point, step, or procedure in a food
process at which food defense measures
can be applied and are essential to
prevent or eliminate a significant
vulnerability or reduce such
vulnerability to an acceptable level. The
term ‘‘actionable process step’’ used in
the food defense context is analogous to
the term ‘‘critical control point’’ (CCP),
which is defined as ‘‘a point, step, or
procedure in a food process at which
control can be applied and is essential
to prevent or eliminate a food safety
hazard or reduce such hazard to an
acceptable level.’’ Similar to a CCP, in
proposed part 121, an ‘‘actionable
process step’’ is identified during a
vulnerability assessment (analogous to a
hazard analysis) in relation to a
significant vulnerability (analogous to a
hazard that is reasonably likely to
occur), and is facility-specific.
As discussed in section V.C.2 of this
document, based on vulnerability
assessments, FDA has identified four
key activity types that we have
tentatively concluded pose significant
vulnerabilities in a food operation. FDA
identified and described these key
activity types (which are not facilityspecific) with the expectation that an
owner, operator, or agent in charge
would objectively determine whether
the processing steps in a facility fit
within one or more of these key activity
types. The processing steps identified
by facilities in their food operation that
fit within the FDA-identified key
activity types are ‘‘actionable process
steps,’’ and are steps at which a focused
mitigation strategy would be employed
to prevent or eliminate a significant
vulnerability or reduce it to an
acceptable level. Actionable process
steps might also be identified in a
vulnerability assessment (proposed
§ 121.130(b)). Though we use the term
‘‘actionable process step’’ in FDA’s
FDPB software tool (Ref. 31), we
recognize it is a relatively new term and,
therefore, we solicit comment on its
appropriateness and any other more
appropriate alternative terms.
FDA is proposing to define the term
‘‘contaminant’’ as any biological,
chemical, physical or radiological agent
that may be intentionally added to food
and that may cause illness, injury or
death. We based the proposed
definition, in part, on the definition of
‘‘contaminant’’ used in Codex
Alimentarius guidelines (Ref. 49) that
refers to any biological or chemical
agent, foreign matter or other substances
not intentionally added to feed or food
that may compromise feed and food
safety or suitability. In this proposal, the
term ‘‘contaminant’’ is used in the
context of key activity types, which are
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
related to intentional acts of
adulteration caused by acts of terrorism
with intent to cause public health harm
and, to a lesser extent, economic
disruption. Therefore, for the purposes
of proposed part 121, we focused the
definition of ‘‘contaminant’’ on agents
that may be intentionally added to food
and that may cause illness, injury, or
death, which is consistent with our
determination that the primary goal of
such an attack would be public health
harm (i.e., illness, injury, or death). Our
proposed definition of ‘‘contaminant’’ in
proposed 121.3 would be applicable to
proposed part 121 only. We
acknowledge that this term has a
broader meaning in other settings, as
evidenced by its use in the Codex
Alimentarius guidelines.
FDA is proposing to define the term
‘‘facility’’ to mean a domestic facility or
a foreign facility that is required to
register under section 415 of the FD&C
Act in accordance with the
requirements of part 1, subpart H (21
CFR part 1, subpart H). The proposed
definition would incorporate the
definition in section 418(o)(2) of the
FD&C Act.
FDA is proposing to define the term
‘‘farm’’ by reference to the definition of
that term in proposed § 1.227. We are
proposing to cross-reference the
definition of ‘‘farm’’ rather than to
define it in proposed part 121 because
the definition of ‘‘farm,’’ under both
current § 1.227(b)(3) and proposed
§ 1.227, includes the word ‘‘facility’’
with a meaning that is broader than the
meaning of ‘‘facility’’ in section
418(o)(2) of the FD&C Act. Under part
1, subpart H, the term ‘‘facility’’ is not
limited to entities that are required to
register under section 415 of the FD&C
Act. We are proposing to cross-reference
the definition to reduce the potential
confusion that could result if we used
the term ‘‘facility’’ to have two different
meanings within proposed part 121. See
sections X.B and VIII of the PC proposed
rule for additional information.
FDA is proposing to define the term
‘‘focused mitigation strategies’’ to mean
those risk-based, reasonably appropriate
measures that a person knowledgeable
about food defense would employ to
significantly minimize or prevent
significant vulnerabilities identified at
actionable process steps, and that are
consistent with the current scientific
understanding of food defense at the
time of the analysis. The term ‘‘focused
mitigation strategies’’ used in the food
defense context is analogous to the term
‘‘preventive controls’’ in a HACCP-type
framework for food safety.
As discussed in section V.C.3 of this
document, a mitigation strategy is a
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
78031
measure taken by a facility to reduce the
potential for intentional adulteration of
food. A ‘‘focused mitigation strategy’’ is
such a strategy applied in response to
the identification of a significant
vulnerability and at an actionable
process step. Focused mitigation
strategies are customized to the
processing step at which they are
applied, tailored to existing facility
practices and procedures, and depend
on an evaluation of the vulnerabilities
identified in a facility. Because they are
applied in response to a significant
vulnerability, we have determined that
focused mitigation strategies are
essential to ensure that appropriate
action is taken to protect the food from
intentional adulteration caused by acts
of terrorism.
While an option to perform a
vulnerability assessment is provided
under proposed § 121.130(b), facilities
may choose instead to rely on the
analysis performed by FDA that resulted
in the identification of the key activity
types listed in proposed § 121.130(a)
when identifying actionable process
steps and, subsequently, focused
mitigation strategies, eliminating the
need for a full vulnerability assessment.
See section V.C.3 of this document for
examples of focused mitigation
strategies.
FDA is proposing to define the term
‘‘food defense’’ as the effort to protect
food from intentional acts of
adulteration where there is an intent to
cause public health harm and economic
disruption. As discussed in section IV.A
of this document, acts of intentional
adulteration may take several forms,
including acts of terrorism; acts of
disgruntled employees, consumers, or
competitors; and economically
motivated adulteration. We are
proposing to define the term ‘‘food
defense’’ to refer to the sum of actions
and activities (including identification
of actionable process steps;
implementation of focused mitigation
strategies; monitoring, corrective
actions, verification, and training
activities) taken to protect food from
intentional acts of adulteration related
to terrorism.
FDA is proposing to define the term
‘‘holding’’ to mean the storage of food.
The proposed definition would also
state that holding facilities include
warehouses, cold storage facilities,
storage silos, grain elevators, and liquid
storage tanks; and that, for farms and
farm mixed-type facilities, holding also
includes activities traditionally
performed by farms for the safe or
effective storage of raw agricultural
commodities grown or raised on the
same farm or another farm under the
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78032
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
same ownership, but does not include
activities that transform a raw
agricultural commodity, as defined in
section 201(r) of the FD&C Act, into a
processed food as defined in section
201(gg) of the FD&C Act. For
consistency of terminology, we are
proposing the same definition of
‘‘holding’’ as in the PC proposed rule
(see proposed §§ 1.227 and 117.3). For
a detailed discussion of ‘‘holding,’’ see
sections VIII.E and X.B of the PC
proposed rule.
FDA is proposing to define the term
‘‘manufacturing/processing’’ to mean
making food from one or more
ingredients, or synthesizing, preparing,
treating, modifying or manipulating
food, including food crops or
ingredients. The proposed definition
would also state that examples of
manufacturing/processing activities are
cutting, peeling, trimming, washing,
waxing, eviscerating, rendering,
cooking, baking, freezing, cooling,
pasteurizing, homogenizing, mixing,
formulating, bottling, milling, grinding,
extracting juice, distilling, labeling, or
packaging. The proposed definition
would also specify that, for farms and
farm mixed-type facilities,
manufacturing/processing does not
include activities that are part of
harvesting, packing, or holding. For
consistency of terminology, we are
proposing the same definition of
‘‘manufacturing/processing’’ as in the
PC proposed rule (see proposed §§ 1.227
and 117.3). For a detailed discussion of
‘‘manufacturing/processing,’’ see
sections VIII.E and X.B of the PC
proposed rule.
FDA is proposing to define the term
‘‘mixed-type facility’’ to mean an
establishment that engages in both
activities that are exempt from
registration under section 415 of the
FD&C Act and activities that require the
establishment to be registered. The
proposed definition would also state
that an example of such a facility is a
‘‘farm mixed-type facility,’’ which is an
establishment that grows and harvests
crops or raises animals and may
conduct other activities within the farm
definition, but also conducts activities
that require the establishment to be
registered. For consistency of
terminology, we are proposing the same
definition of ‘‘mixed-type facility’’ as in
the PC proposed rule (see proposed
§§ 1.227 and 117.3). For a detailed
discussion of ‘‘mixed-type facilities,’’
see sections VIII.E and X.B of the PC
proposed rule.
FDA is proposing to define the term
‘‘monitor’’ to mean to conduct a
planned sequence of observations or
measurements to assess whether
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
focused mitigation strategies are
consistently applied and to produce an
accurate record for use in verification.
In the intentional adulteration
framework, monitoring would be
performed to ensure that focused
mitigation strategies are consistently
applied and to provide a record for use
in verifying consistent application.
FDA is proposing to define the term
‘‘packing’’ to mean placing food into a
container other than packaging the food.
The proposed definition would also
specify that, for farms and farm mixedtype facilities, packing also includes
activities traditionally performed by
farms to prepare raw agricultural
commodities grown or raised on the
same farm or another farm under the
same ownership for storage and
transport, but does not include activities
that transform a raw agricultural
commodity, as defined in section 201(r)
of the FD&C Act, into a processed food
as defined in section 201(gg). We are
proposing to use the same definition of
‘‘packing’’ as in the PC proposed rule
(see proposed §§ 1.227 and 117.3). For
a detailed discussion of ‘‘packing,’’ see
sections VIII.E and X.B of the PC
proposed rule.
FDA is proposing to define the term
‘‘qualified end-user’’ to mean, with
respect to a food, the consumer of the
food (where the term consumer does not
include a business); or a restaurant or
retail food establishment (as those terms
are defined in § 1.227) that: (1) Is
located: (i) in the same State as the
qualified facility that sold the food to
such restaurant or establishment; or (ii)
not more than 275 miles from such
facility; and (2) is purchasing the food
for sale directly to consumers at such
restaurant or retail food establishment.
The proposed definition would
incorporate the definition in section
418(l)(4)(B) of the FD&C Act.
FDA is proposing to define the term
‘‘qualified facility’’ to mean (when
including the sales by any subsidiary;
affiliate; or subsidiaries or affiliates,
collectively, of any entity of which the
facility is a subsidiary or affiliate) a
facility that is: (1) A very small business
as defined in this part; or (2) a facility
to which both of the following apply: (i)
During the 3-year period preceding the
applicable calendar year, the average
annual monetary value of the food
manufactured, processed, packed or
held at such facility that is sold directly
to qualified end-users (as defined in this
part) during such period exceeded the
average annual monetary value of the
food sold by such facility to all other
purchasers; and (ii) the average annual
monetary value of all food sold during
the 3-year period preceding the
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
applicable calendar year was less than
$500,000, adjusted for inflation.
We acknowledge that facilities would
not need to consider the applicability of
previous paragraph (2) because facilities
that meet this second prong of the
definition would be included in our
proposed definition of a very small
business, which is broader.
The proposed definition would
incorporate the description of ‘‘qualified
facility’’ in section 418(l)(1) of the FD&C
Act with editorial changes to improve
clarity.
FDA is proposing to define the term
‘‘significant vulnerability’’ to mean a
vulnerability for which a prudent
person knowledgeable about food
defense would employ food defense
measures because of the potential for
serious adverse health consequences or
death and the degree of accessibility to
that point in the food process. The term
‘‘significant vulnerability’’ is analogous
to the term ‘‘hazard that is reasonably
likely to occur’’ in a HACCP-type
framework for food safety. As proposed,
a ‘‘significant vulnerability’’ is a type of
vulnerability for which there is both: (1)
The potential for serious adverse health
consequences or death from the
intentional introduction of a
contaminant at the particular point in
the process at which the significant
vulnerability exists; and (2) a significant
degree of accessibility at the particular
point in the process. Unlike a ‘‘hazard
that is reasonably likely to occur’’ in a
HACCP system, a ‘‘significant
vulnerability’’ exists at a particular
point in a process (e.g., during storage
in a bulk tank or during mixing). As
discussed in section V.C.2 of this
document, we have determined that
significant vulnerabilities exist in a food
operation at those actionable process
steps that fit in the FDA-identified key
activity types or that are identified as
part of a vulnerability assessment.
We have retained in this proposed
definition the concept of a ‘‘prudent
person’’ used in the definition of a
‘‘hazard that is reasonably likely to
occur’’ in the PC proposed rule.
However, because intentional
adulteration is a potentially high
consequence but low probability
occurrence, the portion of the proposed
definition in the PC proposed rule that
reads, ‘‘experience, illness data,
scientific reports, or other information
provides a basis to conclude that there
is a reasonable possibility that the
hazard will occur in the type of food
being manufactured, processed, packed,
or held in the absence of those
controls,’’ does not appear to be
appropriate. Successful intentional
adulteration caused by an act of
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
terrorism requires not only the absence
of focused mitigation strategies designed
to address a significant vulnerability,
but also simultaneous intent by an
attacker to adulterate the food. As such,
the absence of focused mitigation
strategies to address a significant
vulnerability alone may not present a
reasonable possibility of intentional
adulteration. Instead, as described
above, we have tentatively concluded
that the prudent person would consider
the potential for public health
consequences should intentional
adulteration occur, and the degree of
access by the attacker to commit the
intentional adulteration, in determining
which vulnerabilities are significant.
FDA is proposing to define the term
‘‘significantly minimize’’ to mean to
reduce to an acceptable level, including
to eliminate. As noted in section X.B of
the PC proposed rule, the term
‘‘significantly minimize’’ is used in
FSMA and is consistent with the
outcome of a ‘‘control measure’’ as
described in the HACCP regulations for
seafood (part 123), juice (part 120), and
meat and poultry (9 CFR part 417).
Generally, a ‘‘control measure’’ is
implemented so that hazards are
prevented, reduced to an acceptable
level, or eliminated.
FDA is proposing to define the term
‘‘small business’’ to mean, for the
purposes of proposed part 121, a
business employing fewer than 500
persons. The proposed limit of 500
employees would include all employees
of the business rather than be limited to
the employees of a particular facility.
We are proposing to establish the same
definition for small business as that
which has been established by the U.S.
Small Business Administration under
13 CFR part 121 for most food
manufacturers.
FDA is proposing to define the term
‘‘verification’’ to mean those activities,
other than monitoring, that establish
that the system is operating according to
the food defense plan. As discussed in
section V.C.6 of this document, we are
not proposing to require validation of
the focused mitigation strategies and,
therefore, we are not proposing to
include a determination of the validity
of the food defense plan within the
definition of verification in proposed
§ 121.3.
FDA is proposing to define the term
‘‘very small business’’ to mean, for the
purposes of proposed part 121, a
business that has less than $10,000,000
in total annual sales of food, adjusted
for inflation. In the discussion on the
regulatory framework in section IV.A of
this document, we discuss our
assessment that the goal of terrorist
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
organizations is to maximize public
health harm and, to a lesser extent,
economic disruption. It is our
assessment that such goals are likely to
drive terrorist organizations to target the
product of relatively large facilities,
especially those for which the brand is
nationally or internationally
recognizable. An attack on such a target
would potentially provide the widescale consequences desired by a terrorist
organization and the significant public
attention that would accompany an
attack on a recognizable brand. Such
facilities are likely to have larger batch
sizes, potentially resulting in greater
human morbidity and mortality.
Further, an attack on a well-recognized,
trusted brand is likely to result in
greater loss of consumer confidence in
the food supply and in the government’s
ability to ensure its safety and,
consequently, cause greater economic
disruption than a relatively unknown
brand that is distributed regionally (Ref.
2, Ref. 50, Ref. 3, Ref. 51, Ref. 6).
Therefore, we have set a threshold of
$10,000,000 in total food sales, adjusted
for inflation, as the level defining a very
small business. Data from the Dun &
Bradstreet Global Business Database
show that businesses with less than
$10,000,000 in total food sales represent
about 3 percent of the market share of
food commodities, but include the
majority of food facilities. Of a total of
65,900 domestic food facilities that are
estimated to have actionable process
steps, about 51,700 are owned by
businesses with less than $10,000,000 in
total annual sales. We request comment
on our proposed definition, and
whether a dollar amount of sales more
than or less than $10,000,000 would be
more appropriate. We also seek
comment on whether this threshold
should be based on total food sold, as
we proposed, or on some appropriate
proportion of food sales. For example,
in the case of foreign facilities, would it
be more appropriate to consider the
proportion of food sold for marketing in
the United States?
FDA is proposing to define the term
‘‘vulnerability’’ to mean the
susceptibility of a point, step, or
procedure in a facility’s food process to
intentional adulteration.
‘‘Vulnerability’’ is used in the term
‘‘vulnerability assessment’’ in section
420 of the FD&C Act and may best be
described in the food defense context as
analogous to the term ‘‘hazard’’ in a
HACCP-type framework for food safety.
While hazards in the unintentional
adulteration context may also be
thought of as analogous to agents or
contaminants in the intentional
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
78033
adulteration context, we have
tentatively concluded that focusing on
individual agents or contaminants is
generally not effective or efficient in
minimizing the risk of intentional
adulteration caused by acts of terrorism.
There are a significant number of
potential agents or contaminants that
could be used in a terrorist attack on
food, with one or more being suitable
for essentially any point in the
production of any specific food. It
would be extremely difficult, if not
impossible, to consider the multiple
combinations of potential contaminants,
points in a food operation, and food
categories, and to determine a strategy
that would effectively address all
possible agents. For this reason,
determining whether there is an agent
that could be intentionally introduced
to a specific food that would then cause
serious adverse health consequences or
death would not be a useful exercise.
Further, many agents or contaminants
that could be used in such an attack are
different from those that are associated
with foodborne illnesses caused by
unintentional adulteration and, as such,
are not expected to be well understood
by operators of food facilities. Therefore,
we have tentatively concluded that in
the intentional adulteration framework
related to acts of terrorism, it is
appropriate to refer to ‘‘vulnerabilities’’
rather than ‘‘hazards’’. According to the
Merriam-Webster dictionary (Ref. 52),
vulnerability is a ‘‘susceptibility,’’ and
we believe this concept best captures
the idea of a point, step, or procedure
where someone intent on intentional
adulteration would focus an attack in a
facility’s food process. See section V.C.2
of this document for a discussion of
assessing vulnerabilities to identify
actionable process steps.
We solicit comment on the proposed
definitions.
B. Exemptions
In subpart A of proposed part 121,
proposed § 121.5 would establish
exemptions from some or all of the
provisions of this proposed regulation.
1. Proposed § 121.5(a)—Exemption for
Qualified Facilities
Proposed § 121.5(a) would provide
that proposed part 121 does not apply
to a qualified facility, except that
qualified facilities must, upon request,
provide for official review
documentation that was relied upon to
demonstrate that the facility meets this
exemption. Such documentation must
be retained for 2 years.
a. Exemption of qualified facilities. As
discussed in section V.A of this
document, proposed § 121.3 would
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78034
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
define a qualified facility to mean (when
including the sales by any subsidiary;
affiliate; or subsidiaries or affiliates,
collectively, of any entity of which the
facility is a subsidiary or affiliate) a
facility that is: (1) A very small business
as defined in this part, or (2) a facility
to which both of the following apply: (i)
During the 3-year period preceding the
applicable calendar year, the average
annual monetary value of the food
manufactured, processed, packed or
held at such facility that is sold directly
to qualified end-users (as defined in this
part) during such period exceeded the
average annual monetary value of the
food sold by such facility to all other
purchasers; and (ii) the average annual
monetary value of all food sold during
the 3-year period preceding the
applicable calendar year was less than
$500,000, adjusted for inflation. In
addition, we are proposing to define
very small business to mean a business
that has less than $10,000,000 in total
annual sales of food, adjusted for
inflation.
Section 418(l)(2)(A) of the FD&C Act
provides that a qualified facility ‘‘shall
not be subject to the requirements under
[sections 418(a) through (i) and (n) of
the FD&C Act].’’ We have tentatively
concluded that we should include the
exemption provided in section
418(l)(2)(A) of the FD&C Act in
proposed § 121.5(a) to establish by
regulation the reach of the provision.
Section 418(l)(5) of the FD&C Act
requires the Secretary of Health and
Human Services, in consultation with
the Secretary of Agriculture, to conduct
a study of the food processing sector
regulated by the Secretary of Health and
Human Services and to make
determinations in five areas. These areas
include, in part: (1) Distribution of food
production by type and size of
operation; (2) the proportion of food
produced by each type and size of
operation; (3) the number and types of
food facilities co-located on farms; (4)
the incidence of foodborne illness
originating from each size and type of
operation; and (5) the effect on
foodborne illness risk associated with
certain activities regarding food.
Section 418(n)(1)(B) of the FD&C Act
requires that the regulations define the
terms ‘‘small business’’ and ‘‘very small
business,’’ taking into consideration the
study of the food processing sector
required by section 418(l)(5) of the
FD&C Act. Consistent with section
418(l)(5) of the FD&C Act, we have
consulted with USDA during our study
of the food processing sector. The study
is available in the docket established for
this proposed rule (Ref. 53). We request
comment on that study. We will
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
consider comments regarding the study,
as well as comments regarding our
proposed definition for very small
business, in any final rule based on this
proposed rule.
We note that section 420 of the FD&C
Act does not contain an explicit sizebased exemption, such as the qualified
facility provision in section 418 of the
FD&C Act. In section IV.A of this
document, we discuss our assessment
that the goal of terrorist organizations is
to maximize public health harm and, to
a lesser extent, economic disruption. We
have tentatively concluded that such
goals are likely to drive terrorist
organizations to target the product of
relatively large facilities, especially
those for which the brand is nationally
or internationally recognizable. The
regulations issued under section 420 of
the FD&C Act are to apply to food for
which there is a high risk of intentional
contamination. We have tentatively
concluded that designating businesses
with less than $10,000,000 in total
annual sales of food as very small
businesses, resulting in their exemption
from proposed part 121, is consistent
with the requirement in section 420 of
the FD&C Act that the regulation be
limited to foods at high risk of
intentional adulteration.
We acknowledge that the amount of
food sales in the proposed definition of
very small business (total annual sales
of food of less than $10,000,000) is
significantly higher than the threshold
in the PC proposed rule, in which we
co-proposed three amounts ($250,000,
$500,000, and $1,000,000 in total
annual sales of food). The higher
amount proposed here reflects the
difference in the nature of risk related
to intentional adulteration covered by
this rule and is consistent with the
requirement in section 418(n)(3)(C) of
the FD&C Act that this regulation
‘‘acknowledge differences in risk and
minimize, as appropriate, the number of
separate standards that apply to separate
foods.’’
There are some facilities that are not
subject to section 418 of the FD&C Act
but are subject to section 420 of the
FD&C Act, and would be subject to this
rulemaking because their activities
would likely involve one of the key
activity types (e.g., juice manufacturing
and breaded seafood manufacturing).
However, under proposed § 121.5(a),
such facilities would be exempt from
proposed part 121 if they are part of
businesses with less than $10,000,000 in
total annual sales of food, adjusted for
inflation.
b. Documentation requirement for
qualified facilities. Sections 418(l)(2)(A)
and (l)(2)(B) of the FD&C Act provide
PO 00000
Frm 00022
Fmt 4701
Sfmt 4702
that a qualified facility is exempt from
the requirements of sections 418(a)
through (i) and (n) (i.e., the
requirements for hazard analysis and
risk-based preventive controls), but
must instead submit two types of
documentation to the Secretary of
Health and Human Services. The first
type of required documentation relates
to food safety practices at the facility,
and section 418(l)(2)(B)(i) of the FD&C
Act provides two options for satisfying
this documentation requirement. Under
section 418(l)(2)(B)(i)(I) of the FD&C
Act, the qualified facility may choose to
submit documentation that
demonstrates that the owner, operator,
or agent in charge of the facility has
identified potential hazards associated
with the food being produced, is
implementing preventive controls to
address the hazards, and is monitoring
the preventive controls to ensure that
such controls are effective.
Alternatively, under section
418(l)(2)(B)(i)(II) of the FD&C Act, the
qualified facility may choose to submit
documentation (which may include
licenses, inspection reports, certificates,
permits, credentials, certification by an
appropriate agency (such as a State
department of agriculture), or other
evidence of oversight), as specified by
the Secretary of Health and Human
Services, that the facility is in
compliance with State, local, county, or
other applicable non-Federal food safety
law.
The second type of required
documentation relates to whether the
facility satisfies the definition of a
qualified facility. Under section
418(l)(2)(B)(ii) of the FD&C Act, the
facility must submit documentation, as
specified by the Secretary of Health and
Human Services in a guidance
document, that the facility is a qualified
facility under section 418(l)(1)(B) or
section 418(l)(1)(C).
Section 418(l)(7)(A) of the FD&C Act
requires that a qualified facility that is
exempt from the requirements under
sections 418(a) through (i) and
subsection (n), and that does not
prepare documentation under section
418(l)(2)(B)(i)(I), provide notification to
consumers by one of two procedures,
depending on whether a food packaging
label is required on the food. With
respect to a food for which a food
packaging label is required by the
Secretary of Health and Human Services
under any other provision of the FD&C
Act, section 418(l)(7)(A)(i) of the FD&C
Act requires that a qualified facility
include prominently and conspicuously
on such label the name and business
address of the facility where the food
was manufactured or processed. With
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
respect to a food for which a food
packaging label is not required by the
Secretary of Health and Human Services
under any other provisions of the FD&C
Act, section 418(l)(7)(A)(ii) of the FD&C
Act requires that a qualified facility
prominently and conspicuously display,
at the point of purchase, the name and
business address of the facility where
the food was manufactured or
processed, on a label, poster, sign,
placard, or documents delivered
contemporaneously with the food in the
normal course of business, or, in the
case of Internet sales, in an electronic
notice.
Section XIII.A of the PC proposed rule
describes our proposed requirements
pursuant to the above described
modified requirements for qualified
facilities in that proposed rule. In
summary, in the PC proposed rule, we
proposed codified language to require
submission of the following to FDA: (1)
Documentation that the facility is a
qualified facility; and (2) documentation
that demonstrates that the owner,
operator, or agent in charge of the
facility has identified the potential
hazards associated with the food being
produced, is implementing preventive
controls to address the hazards, and is
monitoring the performance of the
preventive controls to ensure that such
controls are effective; or documentation
(which may include licenses, inspection
reports, certificates, permits,
credentials, certification by an
appropriate agency (such as a State
department of agriculture), or other
evidence of oversight) that the facility is
in compliance with State, local, county,
or other applicable non-Federal food
safety law, including relevant laws and
regulations of foreign countries. In
Section XIII.A of the PC proposed rule,
we clarified that the following
submission of information would be
satisfactory: (1) A statement from the
owner, operator, or agent in charge of a
qualified facility certifying that the
facility is a very small business,
otherwise meets the definition of a
qualified facility under proposed
§ 117.3, or both; and (2) a statement
from the owner, operator, or agent in
charge of a qualified facility certifying
that the facility (a) has identified the
potential hazards associated with the
food being produced, is implementing
preventive controls to address the
hazards, and is monitoring the
implementation of the preventive
controls to ensure that such controls are
effective; or (b) is in compliance with
State, local, county, or other applicable
non-Federal food safety law, including
relevant laws and regulations of foreign
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
countries. We tentatively concluded that
we would not, for example, require that
a facility submit documentation to FDA
demonstrating the content of their
hazard identification, preventive
controls, or monitoring of the
implementation of preventive controls;
or copies of their non-Federal licenses,
inspection reports, certificates, permits,
credentials, or certifications. We
proposed to require that the information
be resubmitted to FDA at least every 2
years, or whenever there is a material
change to the information. Finally, we
proposed to require that a qualified
facility maintain records relied upon to
support their assertion of meeting the
requirements of the qualified
exemption. We tentatively concluded
that it is appropriate to require that the
records relied upon to support a selfcertified statement be retained and
made available to FDA upon request.
Proposed § 121.5(a) would require
that qualified facilities, upon request,
provide for official review
documentation that was relied upon to
demonstrate that the facility meets this
exemption. In addition, proposed
§ 121.5(a) would provide that such
documentation must be retained for 2
years. We are not proposing to apply all
of the modified requirements described
in proposed § 117.201 in the PC
proposed rule to qualified facilities that
would be covered under this rule. We
have tentatively concluded that such an
approach is reasonable, considering the
context and wording of the statutory
provision as it relates to intentional
adulteration caused by acts of terrorism.
c. Withdrawal of exemption for
qualified facilities. Section 418(l)(3) of
the FD&C Act provides that the
Secretary of Health and Human Services
may withdraw the exemption provided
in section 418(l)(2)(A) under certain
circumstances. We discuss the
withdrawal provisions of section
418(l)(3) of the FD&C Act, and the
process we propose to use to withdraw
an exemption for a qualified facility
subject to that rule in section XIV.E of
the PC proposed rule. We ask for
comment on the appropriateness of
those proposed procedures to withdraw
an exemption for a qualified facility
subject to this proposed rule. We also
seek input on whether we should
include the process for such withdrawal
within proposed part 121 or whether
those provisions might be best placed in
a separate part and cross-referenced in
proposed part 121 in order to reduce
duplication, given these provisions also
appear in the PC and the Produce Safety
proposed rules.
PO 00000
Frm 00023
Fmt 4701
Sfmt 4702
78035
2. Proposed § 121.5(b)—Exemption for
Holding of Food
a. Requirement of section 418 of the
FD&C Act. Section 418(m) of the FD&C
Act provides in relevant part that FDA
may by regulation ‘‘exempt or modify
the requirements for compliance under
[section 418 of the FD&C Act] with
respect to facilities that are solely
engaged in . . . the storage of raw
agricultural commodities (other than
fruits and vegetables) intended for
further distribution or processing or the
storage of packaged foods that are not
exposed to the environment.’’ In the PC
proposed rule, we proposed exemptions
and modified requirements based on
this provision (see proposed §§ 117.5(j),
117.7, and 117.206).
b. Petition relevant to section 418(m)
of the FD&C Act. In a letter dated July
22, 2011, an industry coalition of the
American Bakers Association, the
American Frozen Food Institute, the
Grocery Manufacturers Association, the
International Bottled Water Association,
the International Dairy Foods
Association, the International
Warehouse Logistics Association, the
Peanut and Tree Nut Processors
Association, and the Snack Food
Association (the section 418(m)
petitioners) submitted a citizen petition
(Docket No. FDA–2011–P–0561). The
petition requests that FDA issue
regulations under section 418(m) of the
FD&C Act ‘‘to exempt from compliance
or modify the requirements for
compliance under section 418 [of the
FD&C Act] for facilities that are solely
engaged in the storage of packaged foods
that are not exposed to the environment,
by allowing such facilities to satisfy the
requirements of that section through
compliance with the [CGMPs] mandated
for such facilities by [current] § 110.93.’’
The section 418(m) petitioners assert
that the food safety issues presented by
facilities used only to store packaged
foods that are not exposed to the
environment are essentially the same,
regardless of the type of food. As such,
trade associations representing a variety
of product sectors are signatories to the
petition and are supportive of the
request to exempt such facilities from
the provisions of section 418 of the
FD&C Act.
The section 418(m) petitioners stated,
‘‘As an initial matter, the risk of
intentional adulteration at facilities
solely engaged in the storage of
packaged foods not exposed to the
environment is quite remote. The food
in these facilities is stored in unit
packaging, meaning any effort to
adulterate the food would be laborious
and likely ineffective.’’ They further
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78036
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
asserted that, ‘‘Members of the food
industry have implemented a number of
precautions against intentional
adulteration. Most importantly, these
facilities are locked and secured against
unauthorized entry. Access is restricted
to the employees of the manufacturer
dropping off food, any staff employed at
the facility, and the persons who deliver
food to retailers and other customers.
Food is often held in such facilities for
a short period of time, which would not
be conducive to attempts at intentional
adulteration. Further, we note that the
continual activity in these facilities
during pickup and drop-off hours serves
as a deterrent for anyone attempting to
gain unauthorized access.’’
c. Proposed exemption for the holding
of food. Proposed § 121.5(b) would
exempt from the requirements in
proposed part 121 the holding of food,
except the holding of food in liquid
storage tanks. This provision is broader
in scope than exemptions in proposed
§§ 117.5(j) and 117.7 in the PC proposed
rule, and would exempt, for example,
storage of whole grains, shell eggs, fruits
and vegetables, and packaged foods
(including packaged milk and orange
juice). It would not exempt, for
example, storage in bulk storage tanks of
milk or liquid orange juice.
As discussed in section V.C.2 of this
document, based on an analysis of the
vulnerability assessments that FDA has
conducted using the CARVER+Shock
methodology, we identified four key
activity types (Bulk liquid receiving and
loading; Liquid storage and handling;
Secondary ingredient handling; and
Mixing and similar activities) as
production processes that require
focused mitigation strategies. With the
exception of the holding of food in
liquid storage tanks, which is not
included in the proposed exemption, we
are not aware of activities performed
during the holding of food that fit
within any of these four key activity
types.
We acknowledge that our proposed
exemption in § 121.5(b) is not identical
to the exemption in section 418(m) of
the FD&C Act. However, as explained
above, the holding of food that would be
exempt does not include any of the four
key activity types associated with
actionable process steps under proposed
§ 121.130(a). Consequently, even
without an exemption, this holding of
food would not require the
implementation of focused mitigation
strategies under proposed § 121.130(a)
to protect food against intentional
adulteration. The only requirement
related to holding activities would be
for a written assessment that would
conclude that no focused mitigation
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
strategies are necessary with regard to
the holding activities. Under these
circumstances, we have tentatively
concluded that an exemption is
appropriate. Accordingly, we propose to
exempt the holding of food, except the
holding of food in liquid storage tanks,
from the requirements of this proposed
regulation. Although we are not
responding to the merits of the
arguments of the section 418(m)
petitioners with regard to precautions
against intentional adulteration, we
believe that this proposed exemption
meets the request of the section 418(m)
petitioners.
3. Proposed § 121.5(c)—Exemption for
Packing, Re-Packing, Labeling, and Relabeling of Food
Proposed § 121.5(c) would exempt
from the requirements in proposed part
121 the packing, re-packing, labeling, or
re-labeling of food where the container
that directly contacts the food remains
intact. As discussed in section V.C.2 of
this document, based on an analysis of
the vulnerability assessments that FDA
has conducted using the
CARVER+Shock methodology, we
identified four key activity types (Bulk
liquid receiving and loading; Liquid
storage and handling; Secondary
ingredient handling; and Mixing and
similar activities) as production
processes that require focused
mitigation strategies. We are not aware
of activities performed during the
packing, re-packing, labeling, or relabeling of food where the immediate
package or container of the food remains
intact that fit within any of these four
key activity types.
As discussed in section V.A of this
document, the proposed rule would not
require a facility that chooses to identify
its actionable process steps under
proposed § 121.30(a) to implement
focused mitigation strategies for a food
process that does not include any of the
four key activity types. Even without the
exemption, a facility that conducts
packing, re-packing, labeling, or relabeling activities would be able to
conclude that it has no key activity
types and, therefore, would not be
required to implement focused
mitigation strategies. However, without
an exemption, under proposed
§ 121.130, such a facility would be
required to perform a written
assessment to make this determination.
We have tentatively concluded that
requiring such an assessment is
unnecessary. Consequently, we propose
to exempt the packing, re-packing,
labeling, or re-labeling of food where the
container that directly contacts the food
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
remains intact from the requirements of
this proposed regulation.
4. Proposed § 121.5(d)—Exemption for
Produce Farms
Proposed § 121.5(d) would exempt
from the requirements in proposed part
121 the activities of a facility that are
subject to section 419 of the FD&C Act
(Standards for Produce Safety). We
discuss our tentative decision not to
cover produce farms under section 419
of the FD&C Act in sections IV.B and
IV.F, respectively, of this document.
Section 418(k) of the FD&C Act
provides that section 418 ‘‘shall not
apply to activities of a facility that are
subject to section 419’’. Section 419 of
the FD&C Act, ‘‘Standards for Produce
Safety,’’ requires FDA to establish by
regulation ‘‘science-based minimum
standards for the safe production and
harvesting of those types of fruits and
vegetables, including specific mixes or
categories of fruits and vegetables, that
are raw agricultural commodities for
which [FDA] has determined that such
standards minimize the risk of serious
adverse health consequences or death.’’
Section 419(h) of the FD&C Act provides
that section 419 ‘‘shall not apply to
activities of a facility that are subject to
section 418.’’
Establishments that are exempt from
registration under section 415 of the
FD&C Act as ‘‘farms’’ would not be
subject to section 418 of the FD&C Act
when conducting activities within the
farm definition. Farm mixed-type
facilities would be subject to section 418
of the FD&C Act when conducting those
activities that trigger the section 415
registration requirement. We have
tentatively concluded that
Congressional intent regarding the reach
of section 418(k) of the FD&C Act is
unambiguous in that section 418(k)
directly limits the exemption to
activities of the facility that are subject
to section 419 of the FD&C Act. We have
also tentatively concluded that we
should include a provision
implementing section 418(k) of the
FD&C Act in the proposed regulation to
establish by regulation the reach of the
exemption. Therefore, in proposed
§ 121.5(d), we are proposing that
proposed part 121 would not apply to
activities of a facility that are subject to
section 419 of the FD&C Act (Standards
for Produce Safety).
At the time FDA developed the farm
definition and its interpretations of that
definition, the practical impact of an
activity’s classification as inside or
outside that definition was limited to
the potential to trigger the section 415
registration regulations and the section
414 recordkeeping regulations. With the
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
advent of FSMA, the scope of the farm
definition has taken on more
importance because, for example,
activities within the farm definition are
not subject to section 418 of the FD&C
Act, but activities outside the farm
definition are subject to section 418.
Therefore, FDA proposed to clarify and
adjust the scope of the farm definition,
including the classification of
manufacturing, processing, packing, and
holding activities relevant to that
definition, in the proposed preventive
controls regulations for human food. In
section VIII.D of the PC proposed rule,
we described a set of organizing
principles that would form the basis for
our proposal for classifying activities to
more accurately reflect the scope of
activities traditionally conducted by
farms and to allow for more certainty
among industry with regard to how their
activities will be regulated.
5. Proposed § 121.5(e)—Exemption for
Alcoholic Beverages
Proposed § 121.5(e)(1) would provide
that proposed part 121 does not apply
with respect to alcoholic beverages at a
facility that meets the following two
conditions: (i) Under the Federal
Alcohol Administration Act (27 U.S.C.
201 et seq.) or chapter 51 of subtitle E
of the Internal Revenue Code of 1986
(26 U.S.C. 5001 et seq.) the facility is
required to obtain a permit from,
register with, or obtain approval of a
notice or application from the Secretary
of the Treasury as a condition of doing
business in the United States, or is a
foreign facility of a type that would
require such a permit, registration, or
approval if it were a domestic facility;
and (ii) Under section 415 of the Federal
Food, Drug, and Cosmetic Act (21 U.S.C.
350d) the facility is required to register
as a facility because it is engaged in
manufacturing, processing, packing, or
holding one or more alcoholic
beverages.
Proposed § 121.5(e)(2) would provide
that proposed part 121 does not apply
with respect to food other than alcoholic
beverages at a facility described in
paragraph (e)(1) of this section,
provided such food: (i) Is in
prepackaged form that prevents any
direct human contact with such food;
and (ii) Constitutes not more than 5
percent of the overall sales of the
facility, as determined by the Secretary
of the Treasury.
In section X.C.7 of the PC proposed
rule, we explain in detail our
interpretation of section 116 of FSMA
and our consideration of hazards and
preventive controls for the
manufacturing, processing, packing, and
holding of alcoholic beverages. Based on
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
that analysis, we proposed, in proposed
§ 117.5(i), to exempt certain facilities
engaged in the manufacturing,
processing, packing, or holding of
alcoholic beverages and other food.
Consistent with that analysis, we are
proposing similar exemptions related to
alcoholic beverages in this proposed
rule on focused mitigation strategies for
the protection of food against
intentional adulteration caused by acts
of terrorism.
We have tentatively concluded that
we should include a provision
implementing section 116 of FSMA in
the proposed rule to establish by
regulation the reach of the provision.
We request comment on our
interpretation of section 116 of FSMA,
described in section X.C.7 of the PC
proposed rule, and its application to the
proposed exemption in § 121.5(e).
6. Proposed § 121.5(f)—Exemption for
Food for Animals
Proposed § 121.5(f) would exempt
from the requirements of proposed part
121 the manufacturing, processing,
packing, and holding of food for animals
other than man. In the Animal Food PC
proposed rule, we proposed to require
that facilities that manufacture, process,
pack, or hold animal food and that are
not otherwise covered by certain
exemptions, design and implement a
system of preventive controls to address
food safety issues. In that proposed
rulemaking, we tentatively concluded
that hazards associated with intentional
adulteration would likely require
different kinds of controls and would be
best addressed in a separate rulemaking.
We also requested comment in that
rulemaking on whether to include in
those regulations potential hazards that
may be intentionally introduced for
economic reasons, which we refer to as
economically motivated adulteration, a
type of intentional adulteration. Our
current thinking regarding economically
motivated adulteration is discussed in
section IV.F of this document.
Section 418(m) of the FD&C Act
authorizes FDA to exempt or modify the
requirements for compliance with
section 418 with regard to facilities that
engage solely in the production of
animal food. Further, section 420(c) of
the FD&C Act requires that regulations
that FDA issues under that section
apply only to food for which there is a
high risk of intentional contamination.
In section IV.A of this document, we
discuss how FDA is proposing to
implement the provisions of sections
418 and 420 of the FD&C Act with
regard to circumstances under which a
facility subject to either of these sections
would be required to have and
PO 00000
Frm 00025
Fmt 4701
Sfmt 4702
78037
implement focused mitigation strategies
under a HACCP-like system to address
intentional adulteration related to
terrorism. In summary, this proposed
rule would require a facility to
implement focused mitigation strategies
if one or more of four key activity types
are applicable to its food operation or if
a facility conducts its own vulnerability
assessment and identifies actionable
process steps for significant
vulnerabilities in its food operation.
The identification of a production
step for a food as necessitating focused
mitigation strategies is premised upon
an analysis, based on CARVER+Shock
methodology, that an attack at these
points in the production of a food
would likely result in an outcome that
is consistent with our understanding of
the goal of terrorist organizations (i.e.,
maximizing adverse public health
impacts and, to a lesser extent,
economic disruption) (Ref. 54). For
human foods, our analyses show the
potential for significant human
morbidity and mortality should
intentional adulteration occur at any
one or more of these points in a food
operation. (Significant economic harm
is also likely, related to the human
morbidity and mortality as well as
disruption in the food supply as a result
of loss of consumer confidence in its
safety.) In contrast, for animal food, our
analysis shows only minimal potential
for human morbidity or mortality as a
result of attacks at key activity types or
other points in an animal food
operation. Significantly, our
CARVER+Shock vulnerability
assessments of animal food have had to
focus entirely on economic
consequences because of the lack of
potential for human morbidity and
mortality.
In considering whether to provide an
exemption related to animal food, we
evaluated three types of possible attack
scenarios: (1) Incorporation of a
contaminant into feed to be used for
muscle meat-producing animals; (2)
incorporation of a contaminant into feed
to be used for egg-producing or milkproducing animals; and (3)
incorporation of a contaminant into pet
food. With regard to the two former
scenarios, we are not aware of
contaminants that could be incorporated
into feed at levels that would not
produce noticeable clinical signs and/or
mortality in animals but would result in
significant human morbidity or
mortality among consumers that
subsequently eat the meat, eggs or milk
(Ref. 55). While contaminants can
increase the risk of chronic disease,
such as cancer, among consumers (Ref.
56), such an outcome is not consistent
E:\FR\FM\24DEP2.SGM
24DEP2
78038
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
with our understanding of the goals of
terrorist organizations, which include a
more immediate impact. We recognize
that such an attack could result in
significant economic disruption because
of the loss of consumer confidence in
the safety of the food supply. While
important, attacks of that nature fall
significantly below those involving
human morbidity and mortality when
placed on a scale of risk with regard to
targeting by terrorist organizations.
Regarding the third attack scenario
(incorporation of a contaminant into pet
food), we are aware of contaminants that
could be incorporated into feed or pet
food that could result in significant
animal (including pet) morbidity and
mortality, including some which could
result in secondary infectious spread of
disease (because some infectious agents
can be transmitted orally as well as
through aerosol). Again, such attacks
could be significant from an economic
and societal standpoint. However, the
risk that they pose with regard to
targeting by terrorist organizations
appears to be significantly lower than
those involving human morbidity and
mortality. We request comment on this
assessment of risk.
Therefore, notwithstanding the likely
presence of one or more of the four key
activity types in the production of many
animal foods, we have tentatively
concluded that animal food (regardless
of whether it is produced at a facility
solely engaged in the production of
animal food or at a facility engaged in
the production of both animal and
human food) does not involve
significant vulnerabilities that require
focused mitigation strategies under
section 418 of the FD&C Act and is not
at high risk for intentional adulteration
related to terrorism under section 420 of
the FD&C Act. Consequently, we are
proposing to exempt the manufacturing,
processing, packing, and holding of food
for animals other than man. We request
comment on these tentative
conclusions.
C. Food Defense Measures
In subpart C of proposed part 121,
FDA is proposing various food defense
measures, including requirements for a
food defense plan, identification of
actionable process steps,
implementation of focused mitigation
strategies and related monitoring,
corrective actions, and verification, and
training of certain personnel. We
discuss the provisions of proposed
subpart C in this section.
1. Food Defense Plan
a. Proposed § 121.126(a)—
Requirement for a Food Defense Plan.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
Proposed § 121.126(a) would require
that the owner, operator, or agent in
charge of a facility prepare, or have
prepared, and implement a written food
defense plan. To make clear that the
written plan is related to food defense
rather than to other plans a facility may
have (such as quality control plans or
food safety plans), for purposes of this
rulemaking, we have designated the
‘‘written plan’’ to be a ‘‘food defense
plan.’’ A written food defense plan is
essential for a facility covered by this
rule to implement the plan consistently,
train its employees, and periodically
reanalyze and update the plan. It is also
essential to auditors, and to inspectors,
in the same way written plans are
essential to ensuring food safety. A
written food defense plan addressing
vulnerabilities associated with
intentional adulteration is analogous to
a written HACCP or food safety plan for
hazards associated with unintentional
contamination.
Proposed § 121.126(a) would provide
flexibility for the owner, operator, or
agent in charge of the facility to either
prepare the written food defense plan or
have that plan prepared, in whole or in
part, on its behalf. In addition, proposed
§ 121.126 would provide flexibility for
facilities in the development of their
food defense plans by allowing facilities
to group food types or production
method types if the vulnerabilities,
focused mitigation strategies, and other
required procedures, such as
monitoring, are essentially identical.
Proposed § 121.126(a) would require
that the owner, operator, or agent in
charge of a facility implement the
written food defense plan. Our proposed
requirement to develop and implement
a food defense plan, which includes the
identification of actionable process
steps and implementation of focused
mitigation strategies, reflects our
tentative conclusion that such actions
are measures necessary to prepare and
protect the food supply from intentional
adulteration caused by acts of terrorism.
Proposed § 121.126(a) implements
sections 418(b), (c), (d), (e), (f), and (h),
and 420(b) of the FD&C Act. We seek
comment on these tentative
conclusions.
b. Proposed § 121.126(b)—Contents of
a food defense plan. Proposed
§ 121.126(b)(1) through (b)(5) would
require that the contents of a food
defense plan include:
• The written identification of
actionable process steps as required by
proposed § 121.130;
• The written focused mitigation
strategies as required by proposed
§ 121.135(b);
PO 00000
Frm 00026
Fmt 4701
Sfmt 4702
• The written procedures for
monitoring as required by proposed
§ 121.140(a);
• The written corrective action
procedures as required by proposed
§ 121.145(a)(1); and
• The written verification procedures
as required by proposed § 121.150(e).
Although we are proposing to require
that the contents of food defense plan
include only the specific elements
described above, the food defense plan
can be used as a resource for facilities
to capture additional food defenserelated information. For example,
facilities may also wish to include
information, such as process flow
diagrams, an evaluation of broad
mitigation strategies, emergency contact
information, crisis management plans,
action plans for implementation of
broad mitigation strategies, results of
supplier audits, and other documents,
analysis, reviews, or information the
facility finds relevant to its food defense
program. FDA has developed and
publicly released the user-friendly
FDPB software tool that can be used to
assist a facility to develop a robust food
defense plan. This free tool is available
on the FDA Web site at https://
www.fda.gov/Food/FoodDefense/
ToolsEducationalMaterials/
ucm349888.htm.
Proposed § 121.126, if finalized,
would establish a requirement for every
facility covered by this rule to have its
own written food defense plan. Like the
food safety plan, this facility-based
nature of the written food defense plan
is consistent with the overall framework
of section 418 of the FD&C Act, which
is directed to a facility rather than, for
example, a corporate entity that may
have multiple facilities.
Proposed § 117.126(c) of the PC
proposed rule would require that the
food safety plan be prepared by (or its
preparation overseen by) a qualified
individual (See the discussion in
section XII.A.4 of the PC proposed rule).
We are proposing to require that the
vulnerability assessment be performed
by an individual qualified by experience
and/or training only when facilities
choose to identify actionable process
steps in their food defense plans using
the provisions of proposed § 121.130(b),
whereby they would perform their own
vulnerability assessment. Our proposal
is based on two considerations. First, we
anticipate that most facilities will
develop their food defense plan using
the procedure in proposed § 121.130(a)
for identification of actionable process
steps. Here, FDA has performed much of
the scientific analysis required and
identified the key activity types (see
section V.C.2 of this document for
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
further discussion). Second, we believe
that the identification of focused
mitigation strategies, and the
monitoring, corrective action and
verification activities to implement
them requires less technical expertise
than required for preventive controls
and implementation procedures for
those controls. The former usually
involve focused mitigation strategies to
limit access to specific steps in the
production process with simple visual
checks to monitor them, while the latter
often involve scientific studies to
establish critical limits with process
control instruments to monitor them.
Proposed § 121.126(b) implements
sections 418(h) and 420(b)(2) of the
FD&C Act.
We seek comment on our proposed
provisions related to the written food
defense plan and its contents.
2. Identification of Actionable Process
Steps
a. FDA’s vulnerability assessments
and FDA-identified key activity types.
As noted in section II.B of this
document, under the SPPA Initiative,
FDA, along with USDA, FBI, and DHS,
conducted vulnerability assessments on
products and processes in the food and
agriculture sector. After conclusion of
the initiative, FDA continued
conducting assessments for products
and processes not previously assessed.
To implement section 420(a)(1)(A), FDA
combined and analyzed data from a
subset of these assessments (i.e., those
relevant to the food manufacturing and
distribution segments of the food
system) and identified activities which
consistently ranked high for
vulnerability to intentional adulteration.
FDA published the results of this
analysis in April, 2013 (April 2013
Report) (Ref. 54).
CARVER+Shock methodology is a
tool for assessing the vulnerabilities
within a food system and determining
the most vulnerable points, and
focusing resources on protecting the
most susceptible points. Using the
CARVER+Shock methodology, FDA, in
collaboration with other U.S.
government partners conducted over 50
vulnerability assessments on a wide
range of food products and processes.
Based on these assessments, we
identified the processing steps with the
greatest vulnerability to intentional
adulteration caused by acts of terrorism.
Through this review, we determined
that the processing steps we identified
fit into one of four groups of activities
occurring at those processing steps. We
refer to these as ‘‘key activity types.’’
The key activity types that we have
identified are: (1) Bulk liquid receiving
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
and loading, (2) Liquid storage and
handling, (3) Secondary ingredient
handling, and (4) Mixing and similar
activities. In this proposed rule we have
modified the activity type names and
descriptions from those in the April
2013 Report for clarity.
Providing these key activity types to
facilities for their use in identifying
actionable process steps and developing
focused mitigation strategies provides
some advantages over other approaches
that we might have taken, such as
identifying points in the production of
specific foods at increased risk for
intentional adulteration caused by an
acts of terrorism, or requiring each
facility to perform its own vulnerability
assessment. First, publicly providing a
list of key activity types does not
disclose sensitive information, as might
be the case if we provided
CARVER+Shock scores derived from
our vulnerability assessments for
process steps for specific foods.
Second, providing a list of key
activity types rather than requiring
facilities to perform their own facilityspecific vulnerability assessments
relieves the burden upon the facility to
assemble a team of individuals with the
diverse expertise needed to properly
self-score the steps in their process
(using the CARVER+Shock
Vulnerability Assessment software tool
or another suitable tool). When we
performed vulnerability assessments
during the SPPA initiative our teams
included individuals with expertise in
the production of the food under study,
law enforcement, food science, food
regulatory systems, and public health.
We expect that such an effort is likely
beyond the capacity of many facilities.
Further, by providing a list of key
activity types, we eliminate the need to
identify a CARVER+Shock score, for
example, as the threshold for the
implementation of focused mitigation
strategies. This is important because
CARVER+Shock scores are somewhat
subjective and difficult to correlate
across food types, making identification
of a universal threshold score
challenging.
b. Proposed § 121.130—Requirement
for written identification of actionable
process steps. Proposed § 121.130
would require that the owner, operator,
or agent in charge of a facility identify
any actionable process steps, using the
procedures in either proposed
§ 121.130(a) or proposed § 121.130(b). A
facility would be required to follow
either one of the two specified
procedures, but not both.
Proposed § 121.130 would also
require that the identification of
actionable process steps and the
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
78039
assessment leading to that identification
be written. A written assessment of
whether the facility has one or more of
the key activity types (under proposed
§ 121.130(a)) or a written vulnerability
assessment (under proposed
§ 121.130(b)) would help the facility
organize its assessment, and fully
understand the nature of the
vulnerabilities. In addition, it is
essential for auditors and inspectors to
assess the adequacy of the facility’s
assessment. This written identification
of actionable process steps would also
be essential during reanalysis of the
food defense plan, as would be required
by proposed § 121.150(d). Such a
written document would also be useful
for training purposes as a tool to make
employees aware of the elements of the
facility’s food defense plan.
The written identification of
actionable process steps must include
the justification for whatever conclusion
the owner, operator, or agent in charge
of a facility reaches. Proposed § 121.130
would not limit the requirement for a
written identification of actionable
process steps to only those
circumstances where the owner,
operator, or agent in charge of a facility
identifies one or more actionable
process steps. Rather, under proposed
§ 121.130, a written analysis would be
required even if the conclusion of the
analysis is that there are no actionable
process step.
If a facility chooses to identify
actionable process steps using the
procedure in proposed § 121.130(a), the
written documentation would not need
to include the procedures for assessing
the vulnerabilities associated with
identified actionable process steps. If a
facility chooses to identify actionable
process steps using the procedure in
proposed § 121.130(b), the written
identification of actionable process
steps must include information about
the appropriate methods used to
conduct the vulnerability assessment
and identify actionable process steps,
and the experience and training of the
person(s) who conducted that
assessment (see also discussion in
section V.C.2.d of this document).
Proposed § 121.130 implements
sections 418(b)(2), 418(b)(3), 420(a)(1),
and 420(b)(1) of the FD&C Act.
c. Proposed § 121.130(a)—
Identification of actionable process
steps using FDA-identified key activity
types. Proposed § 121.130(a) would
specify the first of two procedures by
which the proposed requirement for
identification of actionable process
steps in proposed § 121.130 can be met,
i.e., using the FDA-identified key
activity types.
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78040
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
Proposed § 121.130(a) would state
that the owner, operator, or agent in
charge of a facility must assess, for each
type of food manufactured, processed,
packed or held at the facility, whether
the facility has one or more of the
following key activity types and identify
the actionable process steps associated
with any key activity types present:
1. Bulk liquid receiving and loading—
a step in which a bulk liquid is received
and unloaded from an inbound
conveyance or loaded into an outbound
conveyance where a contaminant can be
intentionally introduced and, if it is, it
is likely that the contaminant will be
distributed throughout the liquid due to
sloshing, movement, or turbulence
caused by the receiving and unloading
or loading activity;
2. Liquid storage and handling—a
step in which a liquid is contained in
bulk storage tanks or in holding, surge,
or metering tanks where a contaminant
can be intentionally introduced and, if
it is, it is likely that the contaminant
will be distributed into the food;
3. Secondary ingredient handling—a
staging, preparation, addition, or rework
step where a contaminant can be
intentionally introduced into a
relatively small amount of ingredient or
rework and, if it is, it is likely that the
contaminant will be distributed into a
larger volume of food; and
4. Mixing and similar activities—a
step, such as mixing, blending,
homogenizing, or grinding where a
contaminant can be intentionally
introduced and, if it is, it is likely that
the contaminant will be distributed into
the food.
The owner, operator, or agent in
charge would be required to assess
whether the facility has a food process
that involves any one or more of the
specified four key activity types. If the
food process is found to involve any key
activity types, the owner, operator, or
agent would be required to identify
actionable process step(s) that are
associated with each key activity type
that is present.
For example, based on proposed
§ 121.130(a), a facility may identify a
mixing tank as involving the key
activity type, Mixing and similar
activities, in its operation because the
mixing tank has an unsecured lid and
several sample ports which provide
direct access to the food product and
because a contaminant can be
introduced into the tank through the lid
or one of the sampling ports and, if it
is, the contaminant would be
distributed into the food. The owner
would conclude that the mixing tank is
an actionable process step. We would
expect that this conclusion would be
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
reached for virtually all steps that
involve mixing, blending,
homogenizing, or grinding because
these kinds of process steps generally:
(1) Present an opportunity for access to
the product at or just prior to the
equipment (e.g., in-feed conveyor); and
(2) would cause a contaminant, if
intentionally added, to be distributed
into the food. We expect this conclusion
to be reached regardless of whether the
facility may already have mitigation
strategies in place to impede access to
the mixing tank (e.g., a ‘‘buddy system’’
that ensures that at least two employees
were present at the mixing tank at all
times or a lock on the mixing tank
access ports). The presence of mitigation
strategies should not be considered
when assessing whether a facility has a
process step that involves one of the key
activity types. Any existing mitigation
strategies and their adequacy to
significantly minimize or prevent the
significant vulnerability should be
considered at a later step when
identifying appropriate focused
mitigation strategies, in accordance with
proposed § 121.135.
We acknowledge the possibility,
although not likely, that circumstances
may exist where access at or just prior
to the equipment is not possible (i.e.,
because the equipment is fully enclosed,
with no access ports), and that in such
a situation this process step would not
be identified as fitting within the key
activity type. For example, the owner of
the same facility may assess a second
mixing tank that is part of an entirely
closed system, with no direct access
points into the system, such that an
individual attempting to access this
mixing tank would likely cause a major
disruption to the line, foiling any
attempted intentional adulteration.
Based on this assessment, the owner
may conclude that the enclosed nature
of this second mixing tank renders the
product inaccessible at this step and,
therefore, it does not fit within the key
activity type. In this circumstance, there
would be no requirement to identify an
actionable process step associated with
this mixing tank (in which case, there
also would be no requirement to
implement a focused mitigation strategy
at this step). Under proposed § 121.130,
the owner would be required to
document the basis for the
determination that the second mixing
tank does not fit within the key activity
type. The second mixing tank would
continue to be subject to the
requirement for reanalysis of a food
defense plan, as proposed in
§ 121.150(d) and the facility would
consider the applicability of the four
PO 00000
Frm 00028
Fmt 4701
Sfmt 4702
key activity types during reanalysis. We
request comment on whether there are
specific process steps for specific
products that otherwise fit within one of
the four key activity types but for which
access to the equipment is not possible
(i.e., because the equipment is fully
enclosed, with no access ports).
If the owner, operator, or agent in
charge determines that the food
operation does not involve any of the
key activity types, there would be no
need to identify actionable process
steps. Such a facility, however, would
still be required to document its finding
that none of the key activity types apply
to its food processes, under proposed
§ 121.130. The documentation would be
a part of the written food defense plan
required under proposed § 121.126.
Such a facility would continue to be
subject to the requirement for reanalysis
of a food defense plan, as proposed in
§ 121.150(d).
Proposed § 121.130(a) would require
that the process of identification of
actionable process steps be done ‘‘for
each type of food manufactured,
processed, packed, or held at the
facility.’’ The vulnerability of a food to
intentional contamination may differ
based on the type of food and associated
process, practices, and conditions at the
facility. Therefore, we are proposing
that the facility assess whether it has
any of the key activity types for each
type of food that is manufactured,
processed, packed, or held at that
facility. A facility may find that its
operation related to one type of food
manufactured at that facility involves
one or more of the key activity types,
but all other types of food manufactured
at that facility do not involve any of the
key activity types. In such an instance,
actionable process steps would need to
be identified and focused mitigation
strategies implemented only for the food
type that involved the key activity
types.
Description of key activity types—As
discussed in section V.C.2.a of this
document, our vulnerability
assessments revealed four key activity
types that most commonly rank high:
Bulk liquid receiving and loading;
Liquid storage and handling; Secondary
ingredient handling; and Mixing and
similar activities. We have tentatively
concluded that the presence of any of
these four key activity types in a food
operation indicates a significant
vulnerability for intentional
contamination caused by acts of
terrorism. Based on our assessments, we
believe that these four key activity types
capture the significant vulnerabilities in
a food operation. However, although
generally unlikely, a vulnerability
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
assessment of a specific food at a
specific facility conducted under
proposed § 121.130(b) may identify
significant vulnerabilities at actionable
process steps that are not associated
with one of these four key activity types.
We seek comment on our tentative
conclusion.
Proposed § 121.130(a)(1) would
identify ‘‘Bulk liquid receiving and
loading’’ as a key activity type, based on
our finding that this activity type
commonly ranked high in our
vulnerability assessments. Proposed
§ 121.130(a) would describe this key
activity type as a step in which a bulk
liquid is received and unloaded from an
inbound conveyance or loaded into an
outbound conveyance where a
contaminant can be intentionally
introduced and, if it is, it is likely that
the contaminant will be distributed
throughout the liquid due to sloshing,
movement, or turbulence caused by the
receiving and unloading or loading
activity. Bulk liquid receiving refers to
the inbound movement of liquid
product into a facility for its use in the
food production process, whereas bulk
liquid loading refers to the outbound
movement of liquid product from a
facility for further processing or use by
an end customer/consumer. Examples of
products that may be received or loaded
in bulk include juices, high fructose
corn syrup and other sweeteners, milk,
animal fats, syrups, and vegetable oils.
Bulk liquid receiving and loading
refers to any processing step where a
liquid ingredient is being received and
unloaded at a facility or a liquid
intermediate or finished product is
being loaded into an outbound shipping
transport vehicle and for which there is
an opportunity for a contaminant to be
intentionally introduced into the food.
This key activity type incorporates the
actions of opening the transport vehicle,
attaching any pumping equipment or
hoses, and opening any venting hatches.
The characteristics associated with
these activities are such that there is a
high probability of a contaminant, if
intentionally added, mixing within the
liquid, due to significant sloshing,
movement, and turbulence associated
with the receiving or loading activity. In
addition, the need for worker activity
associated with these processing steps
provides access to hoses, the transport
vessel, and potentially the product as it
is being received or loaded.
Proposed § 121.130(a)(2) would
identify ‘‘Liquid storage and handling’’
as a key activity type, based on our
finding that this activity type ranked
high in our vulnerability assessments.
Proposed § 121.130(a) would describe
this key activity type as a step in which
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
a liquid is contained in bulk storage
tanks or in holding, surge, or metering
tanks where a contaminant can be
intentionally introduced and, if it is, it
is likely that the contaminant will be
distributed into the food. This key
activity type refers to any processing
step where a liquid ingredient or
intermediate or finished liquid product
is stored in either bulk storage tanks or
smaller secondary, non-bulk holding
tanks or surge tanks and for which there
is an opportunity for a contaminant to
be intentionally introduced into the
food. Bulk liquid storage refers to any
storage silo or tank where liquid
product may be stored prior to
introduction into the product stream or
prior to loading for outbound shipping.
Non-bulk tanks can be used to store
non-bulk liquid ingredients (e.g., fats,
oils, vitamin mixes, and sweeteners),
hold liquid product for sample testing
and other quality control activity, or to
control flow rates of liquid ingredients
or product through the production
system. Non-bulk storage tanks also
include tanks or totes where the tamper
evident seals are opened and the
container itself is used for holding. Both
categories of liquid storage can be
considered key processing steps because
if a contaminant were successfully
introduced, there is a high probability of
a contaminant mixing within the liquid
due to the agitation commonly used to
prevent separation within the liquid
medium. Access necessary for the
introduction of a contaminant is
generally available through hatches,
sample ports, and the container lid (in
the case of a tanker or tote for which the
tamper evident seal has been broken).
Proposed § 121.130(a)(3) would
identify ‘‘Secondary ingredient
handling’’ as a key activity type, based
on our finding that this activity type
commonly ranked high in our
vulnerability assessments. Proposed
§ 121.130(a) would describe this key
activity type as the staging, preparation,
addition, or rework step where a
contaminant can be intentionally
introduced into a relatively small
amount of ingredient or rework and, if
it is, it is likely that the contaminant
will be distributed into a larger volume
of food. This key activity type refers to
any processing step where ingredients
(either dry or liquid) are manipulated
prior to or during addition to the
product stream by human contact and
for which there is an opportunity for a
contaminant to be intentionally
introduced into the food. ‘‘Staging’’
refers to the process of opening the
tamper evident packaging of a
secondary ingredient and moving the
PO 00000
Frm 00029
Fmt 4701
Sfmt 4702
78041
ingredient to the production area in
advance of being added into the primary
product stream. ‘‘Preparation’’ refers to
any act of measuring, weighing,
premixing, or otherwise manipulating
the ingredient prior to addition to the
product stream. ‘‘Addition’’ refers to
any act of physically adding ingredient
directly into the product stream or into
surge or meter hoppers in order to
deliver the ingredient into the product
stream. ‘‘Rework’’ refers to clean,
unadulterated food that has been
removed from processing for reasons
other than insanitary conditions or that
has been successfully reconditioned by
reprocessing and that is suitable for use
as food. Staging, preparation, addition,
and rework involving secondary
ingredients are key activities because a
contaminant added to a relatively small
volume of product would be distributed
into the large product flow as the
ingredient or rework is combined with
the other components of the food.
Secondary ingredient staging,
preparation, addition, and rework are
generally open and accessible and that
accessibility is an inherent component
of the activity. Thus, these key activities
provide a potential point of access
where a contaminant could be
introduced into the product stream.
Proposed § 121.130(a)(4) would
identify ‘‘Mixing and similar activities’’
as a key activity type, based on our
finding that the activities commonly
ranked high in our vulnerability
assessments. Proposed § 121.130(a)
would describe this key activity type as
a step, such as mixing, blending,
homogenizing, coating, glazing, or
grinding where a contaminant can be
intentionally introduced and, if it is, it
is likely that the contaminant will be
distributed into the food. This key
activity type refers to any processing
step where there is an opportunity for
a contaminant to be intentionally
introduced into the food, and the
primary purpose or result of the
processing step is: (1) Coating, i.e., to
layer a powder or liquid onto the
surface of a product, such as a batter,
breading, glazing or flavoring; (2)
mixing, i.e., to blend a powder, dough,
or liquid ingredient together; (3)
grinding, i.e., to reduce the particle size
of a solid ingredient or mass to a smaller
granularity; or (4) homogenizing, i.e., to
reduce the particle size of an ingredient
and disperse it throughout a liquid.
These are key activities because a
potential contaminant successfully
added at one of these steps would
generally be readily dispersed
throughout the product. Further, access
is generally available through access
ports, lids, and in-feed conveyors or
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78042
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
flumes. Examples of equipment
associated with these activities include:
Mixers, blenders, homogenizers,
cascade breaders, mills, grinders, and
pulverizers.
We seek comment on these key
activity types, and whether they are
each appropriate to include and
whether there are additional activities
that present significant vulnerability to
intentional adulteration caused by acts
of terrorism.
Proposed § 121.130(a) implements
sections 418(a) through (c) and
420(a)(1)(A) of the FD&C Act.
d. Proposed § 121.130(b)—
Identification of actionable process
steps by conducting a vulnerability
assessment. Proposed § 121.130(b)
would provide the second of two
options for identification of actionable
process steps. Proposed § 121.130(b)
would specify that the owner, operator,
or agent in charge of a facility must
conduct or have conducted, for each
food type manufactured, processed,
packed or held at the facility, an
evaluation to identify and prioritize the
points, steps, and procedures in a food
operation based on their vulnerability to
intentional adulteration and to identify
actionable process steps.
Proposed § 121.130(b) would provide
flexibility to the owner, operator, or
agent in charge of a facility covered by
this rule to conduct, or have conducted,
their own vulnerability assessment of
the food operations at a facility, rather
than assessing their food operation
against the FDA-identified key activity
types. We are proposing that a
vulnerability assessment conducted
under proposed § 121.130(b) must be
performed by an individual(s) qualified
by experience and/or training using
appropriate methods. Training or job
experience is essential to the effective
evaluation of vulnerabilities and
identification of actionable process
steps. Only a trained individual or
individual qualified by job experience
using appropriate methods would be
capable of effectively conducting a
vulnerability assessment, including
assessing the various points, steps, or
procedures in a food process;
identifying and prioritizing those
points, steps, or procedures in a food
process that are susceptible to
intentional contamination; and
identifying actionable process steps
where food defense measures are
essential to address significant
vulnerabilities. Our proposed definition
of significant vulnerability (in proposed
§ 121.3), too, reflects the need for a
qualified individual to make such
assessments where focused mitigation
strategies would be necessary to protect
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
the food from intentional adulteration
caused by acts of terrorism. As noted
above, when we performed vulnerability
assessments during the SPPA initiative
our teams included individuals with
expertise in the production of the food
under study, law enforcement, food
science, food regulatory systems, and
public health. While we are not
proposing to specify the particular
training or experience requirements of
the individual(s) qualified to conduct
such vulnerability assessments, or the
particular methods that must be used to
conduct these assessments, facilities
choosing this procedure in proposed
§ 121.130(b) would be required to
employ appropriate methods and use a
qualified individual(s) to conduct a
robust and scientifically sound
vulnerability assessment of the facility’s
food operation. FDA’s resources
available online, such as the
CARVER+Shock Vulnerability
Assessment software tool and the FDPB
software tool may be helpful.
Finally, as in the case of proposed
§ 121.130(a), proposed § 121.130(b)
would require that the process of
identification of actionable process
steps be done ‘‘for each type of food
manufactured, processed, packed, or
held at the facility.’’ See discussion in
section V.C.2 of this document.
Elements of a Facility-Specific
Vulnerability Assessment—The
elements of an approach to conducting
a facility-specific vulnerability
assessment are:
• Planning to conduct a vulnerability
assessment—collect and evaluate
appropriate background information on
biological, chemical, physical, and
radiological agents of concern, such as
those found in the CDC’s Select Agents
and Toxins List (Ref. 57);
• Assembling the vulnerability
assessment team—identify appropriate
individuals within the organization to
assist in the vulnerability assessment
process. This may include personnel
working in the areas of security, food
safety/quality assurance or control,
human resources, operations,
maintenance, and other individuals
deemed necessary to facilitate the
formation of a vulnerability assessment;
• Developing a process flow
diagram—list out each of the steps in
the food process to be evaluated;
• Identifying significant
vulnerabilities—evaluate each process
step to prioritize vulnerabilities and
identify significant vulnerabilities. For
each process step, the evaluation should
consider, at a minimum: (1) The
potential public health impact if a
contaminant were added; (2) whether
downstream processing steps would
PO 00000
Frm 00030
Fmt 4701
Sfmt 4702
eliminate or remove agents of concern;
(3) the degree of physical access to
product; (4) the ability of an aggressor
to successfully contaminate the product;
and (5) the volume of product impacted.
This evaluation should also include the
rationale or justification for which
process steps were and were not
identified as significant vulnerabilities;
and
• Identifying actionable process
steps—for identified significant
vulnerabilities, indicate where
actionable process steps exist in the
food process and where associated
focused mitigation strategies would be
required to be implemented, under
proposed § 121.135.
Facilities that choose this alternative
may need assistance from outside
experts who are knowledgeable in food
defense and vulnerability assessments.
Some facilities may not have the
resources or the necessary expertise on
site and expert advice may be obtained
when necessary from other sources,
such as trade and industry associations,
independent experts, and regulatory
authorities.
We seek comment on the need for,
and appropriateness of, proposed
§ 121.130(b), including whether, in a
final rule, we should specify the
particular qualifications of individual(s)
performing the vulnerability assessment
or the methods that must be used under
this alternative procedure, and whether
the vulnerability assessment elements,
we described previously, provide
sufficient direction regarding
appropriate methodology.
Proposed § 121.130(b) implements
sections 418(a) to (c) and 420(a)(1)(A) of
the FD&C Act.
3. Focused Mitigation Strategies
a. Requirements of sections 418 and
420 of the FD&C Act. Section 418(c)(2)
of the FD&C Act, in relevant part,
specifies that the owner, operator, or
agent in charge of a facility shall
identify and implement preventive
controls to provide assurances that
hazards identified in the hazard analysis
conducted under section 418(b)(2) of the
FD&C Act will be significantly
minimized or prevented and addressed,
consistent with section 420 of the FD&C
Act, as applicable. Section 418(c)(1)(3)
of the FD&C Act, in relevant part,
specifies that the preventive controls
must also provide assurances that the
food manufactured, processed, packed,
or held by such facility will not be
adulterated under section 402 of the
FD&C Act. Section 418(h) of the FD&C
Act requires that the owner, operator, or
agent in charge of a facility prepare a
written food safety plan that, among
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
other things, identifies the preventive
controls within the plan. Section 420(b)
of the FD&C Act requires FDA to issue
regulations to protect against the
intentional adulteration of food. Such
regulations are to specify appropriate
science–based mitigation strategies or
measures to prepare and protect the
food supply chain at specific vulnerable
points, as appropriate (section 420(b)(2)
of the FD&C Act).
Section 418(o)(3) of the FD&C Act
defines preventive controls as ‘‘those
risk-based, reasonably appropriate
procedures, practices, and processes
that a person knowledgeable about the
safe manufacturing, processing, packing,
or holding of food would employ to
significantly minimize or prevent the
hazards identified under the hazard
analysis conducted under [section
418(b) of the FD&C Act] and that are
consistent with the current scientific
understanding of safe food
manufacturing, processing, packing or
holding at the time of the analysis.’’ The
definition provides that ‘‘those
procedures, practices, and processes
may include the following: (A)
Sanitation procedures for food-contact
surfaces and utensils and food-contact
surfaces of equipment; (B) Supervisor,
manager, and employee hygiene
training; (C) An environmental
monitoring program to verify the
effectiveness of pathogen controls in
processes where a food is exposed to a
potential contaminant in the
environment; (D) A food allergen
control program; (E) A recall plan; (F)
Current Good Manufacturing Practices
(cGMPs) under part 110 of title 21, Code
of Federal Regulations (or any successor
regulations); (G) Supplier verification
activities that relate to the safety of
food.’’ (emphasis added)
In section V.A.2 of this document, we
discuss our proposed definition of
focused mitigation strategy and its
relationship to the definition of
preventive controls in section 418(o)(3)
of the FD&C Act. We are not proposing
requirements for sanitation procedures,
hygiene training, environmental
monitoring, food allergen control, and
CGMPs because these examples are
relevant to food safety, but not to food
defense. We considered proposing to
require a recall plan (as we did in the
PC proposed rule in proposed
§ 117.135(d)(4); see sections XII.C.8 and
XII.D of that document). However, we
tentatively conclude that the usefulness
of a recall plan is greatly reduced in the
context of preventive controls for
intentional adulteration. The
relationship between an implementation
failure and the status of the food is
different in intentional adulteration and
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
food safety contexts. An act of
intentional adulteration caused by
terrorism, historically, has been a rare
event. In the vast majority of cases, the
failure to properly implement a focused
mitigation strategy would not be
expected to result in intentional
adulteration. With intentional
adulteration, adulteration of food
requires not just the opportunity for a
contamination event (i.e., failure of a
mitigation strategy to limit access to an
actionable process step), but also
someone with intent to cause harm at
that same moment. As such, it is
unlikely that a deviation from the
provisions of this proposed rule would
necessitate a recall. In contrast, the
failure to properly implement a
preventive control for a food safety
hazard (for example, where proper cook
temperatures are not reached in a
process) would be expected to more
likely result in a situation where the
food becomes adulterated (e.g., because
the pathogen reasonably likely to be
present in the raw food would not be
eliminated from the food by the
inadequate cooking process), potentially
necessitating a recall.
b. General description of mitigation
strategies. Mitigation strategies are
measures taken by a facility to reduce
the potential for intentional adulteration
of food. Based on these vulnerability
assessments, FDA previously developed
recommendations for mitigation
strategies that can be implemented, as
appropriate, to minimize or prevent
intentional contamination of food.
These mitigation strategies are
presented in our guidance documents
(Ref. 22, Ref. 23, Ref. 24, Ref. 25, Ref.
26), the CARVER+Shock Vulnerability
Assessment software tool (Ref. 29), the
MSD (Ref. 30), and the FDPB software
tool (Ref. 31). FDA divides mitigation
strategies into two types: Broad
Mitigation Strategies and Focused
Mitigation Strategies. We explain each
of these types in this section of the
document.
i. Broad mitigation strategies. Broad
mitigation strategies are general facilitylevel measures that are intended to
minimize a facility’s vulnerability, as a
whole, to potential acts of intentional
contamination. Examples of broad
mitigation strategies are: (1) Physical
security, such as perimeter security
fencing, locking exterior doors,
penetration alarms; (2) personnel
security, such as pre-hire background,
reference checks, identification badges,
and controlled visitor access; (3)
securing hazardous materials, such as
cleaning products, laboratory materials,
and pesticides; (4) management
practices, such as ingredient storage
PO 00000
Frm 00031
Fmt 4701
Sfmt 4702
78043
inventory procedures; key security
procedures, PINs or passwords;
procedures to restrict personal items
from all food production areas;
procedures requiring IDs and uniforms
to be returned when a person’s
employment ends; and supplier
verification or certification procedures;
and (5) crisis management planning,
such as maintenance of updated
emergency contact information,
procedures for responding to reported
threats, and establishment of a
designated food defense leadership
team.
Broad mitigation strategies, by nature,
are generally applicable to a facility,
regardless of the type of food being
processed, and, as such, are not targeted
to a specific processing step in a food
operation. Broad mitigation strategies
address facility-wide vulnerabilities that
may present an opportunity for an
attacker to access the facility and
intentionally adulterate food. Broad
mitigation strategies serve as
foundational actions or procedures that
improve a facility’s overall defense
against intentional contamination
caused by acts of terrorism.
We are proposing to require the
implementation of focused mitigation
strategies only. However, as set out in
our guidance documents (Ref. 22, Ref.
23, Ref. 24, Ref. 25, Ref. 26), we think
it is prudent for facilities to review our
guidance and implement those broad
mitigation strategies that are appropriate
to minimize the risk for intentional
adulteration of food.
ii. Focused mitigation strategies. As
discussed in section V.A of this
document, we are proposing to define
focused mitigation strategies as those
risk-based, reasonably appropriate
measures that a person knowledgeable
about food defense would employ to
significantly minimize or prevent
significant vulnerabilities identified at
actionable process steps, and that are
consistent with the current scientific
understanding of food defense at the
time of the analysis.
Focused mitigation strategies are
specific to an actionable process step in
a food operation where a significant
vulnerability is identified. They
represent reasonably appropriate
measures that are necessary to reduce
the likelihood of intentional
contamination caused by an act of
terrorism at that process step. Focused
mitigation strategies are customized to
the processing step at which they are
applied, tailored to existing facility
practices and procedures, and depend
on an evaluation of the vulnerabilities
identified in a vulnerability assessment.
When properly implemented, focused
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78044
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
mitigation strategies by themselves are
sufficient to significantly minimize or
eliminate the chances that an attacker
would be successful if an act of
intentional adulteration were attempted
at the specific process step. Focused
mitigation strategies focus on
minimizing either the accessibility of an
attacker to the product at a particular
process step or the opportunity for the
attacker to successfully contaminate the
product at that process step, or both.
Based on our vulnerability
assessments, we tentatively conclude
that the implementation of focused
mitigation strategies at actionable
process steps in a food operation is
necessary to minimize or prevent the
significant vulnerabilities that are
identified in a vulnerability assessment
(Ref. 21, Ref. 54, Ref. 58), regardless of
the existence of broad mitigation
strategies. Although broad mitigation
strategies are important to further
reduce the vulnerability for intentional
contamination, they are not sufficient to
significantly minimize the risk of
intentional contamination caused by an
act of terrorism because broad
mitigation strategies are not specific
enough, for example, to counter the
actions of an attacker who has legitimate
access to the facility (i.e., insider attack)
or an attacker who circumvents
perimeter protections (e.g., scaling a
fence), with the goal of intentionally
contaminating the food. Focused
mitigation strategies, on the other hand,
are targeted to actionable process steps
identified in a food operation to reduce
the likelihood of intentional
contamination at those process steps
and, therefore, are essential to ensure
that appropriate food defense measures
are taken to protect the food from
intentional contamination caused by
acts of terrorism. In contrast to broad
mitigation strategies, focused mitigation
strategies are targeted to actionable
process steps and, therefore, are more
effective at countering an attacker who
has legitimate access to the facility. We
have tentatively concluded that we will
continue to encourage the
implementation of broad mitigation
strategies on a voluntary basis, but we
will require the implementation of
focused mitigation strategies at
actionable process steps. We request
comment on this tentative conclusion,
and on whether we should include, in
a final rule, a requirement for the
implementation of any broad mitigation
strategies.
iii. Examples of focused mitigation
strategies for FDA-identified key activity
types. For the FDA-identified key
activity types, a variety of focused
mitigation strategies may be applicable,
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
dependent both on the food
manufactured, processed, packed, or
held at the facility and on the practices
and processes employed at that facility.
We list in this section some examples of
focused mitigation strategies that may
be appropriate to implement at
actionable process steps for each of
these four key activity types. While the
decision of which and how many
focused mitigation strategies would be
appropriate to employ at an actionable
process step is dependent upon the
physical layout and operation at a
specific facility, the examples presented
in the section immediately below
illustrate the decision-making process to
identify and determine appropriate
focused mitigation strategies at an
actionable process step.
Bulk liquid receiving and loading—
Examples of focused mitigation
strategies that may be appropriate
include the following:
1. Controlling access to the receiving
or loading area, conveyances, and
equipment, including hoses and
pumping machinery, to prevent an
unauthorized person from gaining
access to the food during receiving or
loading. Access controls may include:
strategies to easily identify authorized
persons, such as color-coded uniforms
or badges; restricting conveyance
drivers to areas away from the receiving
or loading area (e.g., restricting them to
a lounge or break room); securing hoses
with locking caps or in cabinets; and
ensuring that conveyance access
hatches, vents, and inspection ports are
secured;
2. Ensuring adequate lighting in the
receiving or loading area, which reduces
the ability of an attacker to disguise his
or her actions. Adequate lighting in and
around vulnerable areas of a food
operation increases the likelihood that
other staff will witness the actions of an
attacker and enable them to take steps
to prevent or react to contamination;
3. Increasing observation of the
receiving or loading area, which reduces
the ability of an attacker to disguise his
or her actions. For example, maximizing
the line of sight by removing boxes,
crates, or other obstructions from the
area; positioning quality control
personnel in the receiving or loading
area to supervise operations; or utilizing
closed-circuit TV systems or other
monitoring devices;
4. Verifying that seals on a shipping
conveyance are intact prior to receiving
or after loading a bulk liquid to reduce
the likelihood that the shipping
conveyance was or is accessed during
transport to introduce a contaminant
into the product;
PO 00000
Frm 00032
Fmt 4701
Sfmt 4702
5. Establishing and implementing a
policy for driver check-in and
identification to help confirm driver
identity and verify the individual is
authorized, through verification of
shipping documentation or other means,
to deliver or pick-up the shipment and
reduce the likelihood that an attacker
could fraudulently pose as a driver as a
means of gaining access to the facility;
and
6. Inspecting the shipping conveyance
prior to loading bulk liquids to help
ensure that no contaminant has been
introduced to the conveyance chamber
that could then contaminate the product
once the product is loaded.
Liquid storage and handling—
Examples of focused mitigation
strategies that may be appropriate
include the following:
1. Controlling access to liquid storage,
holding, surge, or metering tanks,
similar to the strategies that may be
applied for controlling access to bulk
liquid receiving and holding;
2. Ensuring that the area around
liquid storage, holding, surge, or
metering tanks is free of unrelated
materials, such as personal items
(backpacks, purses, or packages), and
other items that are not directly related
to the food operation, to reduce the
likelihood of a contaminant being
brought into the area for introduction
into the tank;
3. Ensuring adequate lighting in and
around liquid storage, holding, surge or
metering tanks, similar to the strategies
that may be applied for ensuring
adequate lighting at bulk liquid
receiving and loading;
4. Installing one-way sample ports in
liquid storage, holding, surge, or
metering tanks , so that food product
can be drawn out of the equipment but
a contaminant cannot be inserted into
the tank;
5. Inspecting tanks prior to filling to
help ensure that no contaminant has
been introduced into the empty tank
that could then contaminate the product
once loaded;
6. Inspecting pumping or metering
equipment prior to use to help ensure
that no contaminant has been
introduced into the equipment that
could contaminate the product;
7. Using enclosed tanks and transfer
systems to move materials to reduce the
potential for an attacker to access the
product and introduce a contaminant;
and
8. Positioning holding, surge, or
metering tanks to increase visibility,
such that frequent observation is
facilitated and visibility of activity
around the tank is improved. This
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
focused mitigation strategy may be less
practical for longer term storage tanks.
Secondary ingredient handling—
Examples of focused mitigation
strategies that may be appropriate
include the following:
1. Controlling access to ingredient
handling areas, including where
secondary ingredients or rework are
staged, prepared, or added to the
product stream, to prevent an
unauthorized person from gaining
access to the ingredients or rework
during these processes. As with other
key activity types, access controls may
include strategies to easily identify
authorized persons, such as with color
coded uniforms or badges, or
conducting ingredient handling
activities in areas behind locking gates,
doors, or other barriers;
2. Ensuring the secondary ingredient
handling area is free of unrelated
materials, such as personal items or
other items not directly related to the
activity, to help ensure that a
contaminant is not brought into the area
for introduction into the ingredient
during staging, preparation, or addition;
3. Ensuring adequate lighting and
increasing visibility in and around
ingredient staging and handling areas,
similar to the strategies that may be
employed to ensure adequate lighting at
bulk liquid receiving and holding;
4. Reducing staging time to reduce the
opportunity for intentional adulteration.
Any time sealed or tamper-evident
containers are breached provides a
potential opportunity for an attacker to
introduce a contaminant into the
ingredient or rework. Reducing the time
ingredients and rework are staged in
unsecured containers reduces the
opportunity for an attacker to adulterate
the ingredient or rework;
5. Restricting secondary ingredient
handling to senior staff to reduce the
accessibility and opportunity for
intentional adulteration;
6. Using peer monitoring in the
ingredient handling area, because
requiring at least two staff members to
be in the area at any given time during
operations can reduce the opportunity
for a contaminant to be discreetly
introduced into the food;
7. Using automated and enclosed
ingredient handling equipment, such as
automated computer weighing,
measuring, and addition equipment, to
reduce human contact with secondary
ingredients or rework and thereby
reduce the opportunity for introduction
of a contaminant; and
8. Inspecting secondary ingredients
held in staging and investigating any
irregularities in the amount, condition,
or organization of items in secondary
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
ingredient handling areas to identify
circumstances that suggest product
contamination before a contaminated
ingredient is added to the product
stream.
Mixing and similar activities—
Examples of focused mitigation
strategies that may be appropriate
include the following:
1. Controlling access to processing
areas where mixing and similar
activities are conducted to prevent an
unauthorized person from gaining
access to the product and equipment.
Access controls may include: strategies
to easily identify authorized persons,
such as with color coded uniforms or
badges; conducting these activities in
areas behind locking gates, doors, or
other barriers; securing access to
overhead gangways and sampling
platforms; and securing hatches, ports,
and lids with locks or access alarm
devices;
2. Ensuring that the area is free of
unrelated materials, such as personal
items and other items that are not
directly related to the activity, to reduce
the likelihood of a contaminant being
brought into the area for introduction
into the ingredient during mixing and
similar activities;
3. Ensuring adequate lighting and
increasing visibility in and around
mixing and similar activities areas,
similar to the strategies that may be
employed to ensure adequate lighting at
bulk receiving and loading;
4. Positioning mixing and similar
equipment in a manner that maximizes
visibility, similar to the strategies that
may be employed to maximize visibility
for liquid storage and handling;
5. Using one-way sample ports that
prohibit introduction of a contaminant
into the mixing or similar equipment,
similar to the strategies that may be
employed for liquid storage and
handling;
6. Conducting inspections of mixing
and similar equipment prior to use to
help ensure no contaminant has been
introduced that could contaminate the
product once loaded;
7. Restricting mixing and similar
activities to senior staff, similar to the
strategies that may be employed for
secondary ingredient handling;
8. Using peer monitoring in this area
to ensure that at least two staff members
are in this area at any given time during
operations, reducing the opportunity for
a contaminant to be discreetly
introduced into the food; and
9. Using automated, self-contained,
enclosed equipment to reduce human
contact with the product and reduce the
opportunity for introduction of a
contaminant.
PO 00000
Frm 00033
Fmt 4701
Sfmt 4702
78045
These examples of focused mitigation
strategies are consistent with measures
included in the MSD. The examples are
not intended to be an exhaustive list of
appropriate focused mitigation
strategies. For additional guidance on
identifying appropriate focused
mitigation strategies, see our guidance
documents, the MSD, and other
resources (see section II.D of this
document).
iv. Specific examples of determining
appropriate focused mitigation
strategies. In this section, we discuss
specific examples of the decisionmaking process to identify and
determine appropriate focused
mitigation strategies at an actionable
process step for each of the FDAidentified key activity types.
Bulk liquid receiving and loading—
Unloading at Facility A’s bulk tanker
truck unloading bay is an actionable
process step for this key activity type.
Facility A has a significant vulnerability
related to access to the food during the
unloading of the bulk liquid. At Facility
A, the tanker truck drives into the
unloading bay without passing through
any security check-in procedures. A
single facility employee is assigned to
this area and takes a facility-owned hose
from an open shelving unit in the
unloading bay and attaches it to the
tanker truck’s unloading port. The
driver of the tanker truck assists in
unloading by opening the venting hatch
at the top of the tanker truck while the
facility employee is attaching the hose.
The driver then waits in the unloading
bay area while the truck is being
unloaded. Upon completion of
unloading activities, the driver gets back
in the truck and exits the facility.
Facility A is not implementing
focused mitigation strategies at this
actionable process step such that access
to the food during unloading of the bulk
liquid is significantly minimized or
eliminated. The food is significantly
vulnerable to an attacker (in this case,
potentially the driver, the facility
employee, or a third party) who could
intentionally add a contaminant to the
product to adulterate the food. One
approach for Facility A to significantly
minimize or eliminate the significant
vulnerability at this actionable process
step is to implement the following
focused mitigation strategies:
• Establish a receiving check-in and
verification procedure to ensure that the
shipment is being delivered by the
proper firm and that the driver is
properly identified. The procedure
would be documented and maintained
in a shipping log that records the key
identifying information about the driver,
tanker truck, and shipping
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78046
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
documentation for the delivered
product. The facility would also
institute a policy requiring that the
shipping documentation include the ID
numbers of the seals on the unloading
ports so that the facility employee can
verify that seal numbers match the
shipping documentation and that the
seals were not broken, tampered with or
replaced during transport.
• Implement a procedure to store
hoses securely to reduce the likelihood
an attacker could add a contaminant to
the hoses when not in use. This would
include storing hoses in locking
cabinets and placing end caps on the
hoses. The facility also would issue keys
only to staff working in the tanker truck
receiving bay and use a key numbering
and tracking system to verify that all
keys are accounted for.
• Increase active observation of the
unloading process to reduce the
likelihood of an attacker successfully
introducing a contaminant by requiring
two or more production staff members
to be present during unloading activities
(i.e., peer monitoring), or requiring the
bulk liquid unloading operations be
overseen by a supervisor or a member of
the quality control staff. Alternatively,
the facility could employ video
surveillance of the area. If the truck
driver is permitted to remain in the area
of the receiving bay, the introduction of
active observation practices ensures that
no contaminant could be intentionally
introduced to the product during
unloading activities. Alternatively, the
facility could limit the driver’s access to
the product by restricting the location of
the driver to designated areas outside
the loading area while the truck is being
unloaded.
In this example, the focused
mitigation strategies were selected to
achieve the following goals: Establishing
the identity of personnel with access to
the food; ensuring that equipment that
may be used to introduce a contaminant
is secured when not in use; and
providing active observation of
activities at actionable process steps. By
implementing these focused mitigation
strategies, the facility could significantly
minimize the significant vulnerability
identified at the actionable process step.
Liquid storage and handling—The
storage of liquid in Facility B’s bulk
liquid storage tank is an actionable
process step for this key activity type.
Facility B’s bulk storage tank holding a
primary ingredient is located within its
building, and a significant vulnerability
relates to access to the food during such
storage. In Facility B, a network of
gangways, ladders, and platforms
surround the bulk liquid storage tank so
that personnel can gain access to a hatch
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
at the top of the tank. Facility B has a
procedure for securing this hatch with
a lock, and the facility stores the key to
the hatch in the operations manager’s
office. To access a key, a worker must
request the key from the operations
manager and justify the need to open
the lock. When an employee checks out
the key, the manager’s assistant records
the employee’s name, time the key is
checked out, and the reason. Facility B’s
bulk liquid storage tank also has a
second hatch along the side which is
used for cleaning the tank when empty
and is not locked. This secondary hatch
is not accessible while product is in the
tank because it opens inward, and
pressure from product in the tank
prevents the hatch from being opened
when product is present.
In considering the requirement for
focused mitigation strategies at this
actionable process step, Facility B
would determine that it has sufficient
safeguards in place to significantly
minimize the likelihood of intentional
adulteration from an attacker accessing
the hatch on the top of the bulk storage
tank. However, the facility would
identify the secondary hatch as
presenting a significant vulnerability for
which insufficient focused mitigation
strategies are being implemented. While
food is in the tank, the secondary hatch
is secure. However, when the tank is
empty after cleaning, there is an
opportunity for an attacker to introduce
a contaminant into the tank via the
secondary hatch which would then
contaminate the food when it is added
to the tank. To significantly minimize or
eliminate the significant vulnerability
presented by the secondary hatch, the
facility would implement focused
mitigation strategies to restrict and
document access to the secondary hatch
as is done for the hatch on the top of
the tank. To do this, the facility would
install a lock on the secondary hatch
and incorporate the key for the
secondary hatch into its existing key
management system. Alternatively, the
facility could implement a procedure of
monitoring the condition of the tank
interior immediately prior to
reintroducing product to the tank. This
monitoring check would be recorded in
a monitoring log.
Facility B already has in place some
practices that we would consider
appropriate focused mitigation
strategies. The procedures in place to
control access to the top access hatch on
the bulk liquid storage tank are
sufficient to minimize the significant
vulnerability presented by this hatch.
However, Facility B still has a
significant vulnerability associated with
the secondary access hatch, which
PO 00000
Frm 00034
Fmt 4701
Sfmt 4702
required additional focused mitigation
strategies to significantly reduce or
eliminate the risk of intentional
contamination.
Another example of an actionable
process step for the key activity type
‘‘Liquid Storage and Handling’’ is liquid
storage in a liquid surge tank located
above an in-line bottling operation at
Facility C. The surge tank is used to
control the flow rate of liquid product
into the bottling equipment and is
enclosed by an unlocked lid. A ladder
and walkway enable workers to access
the surge tank as needed to monitor
product flow and take quality control
samples. Facility C has an operations
control room, which is equipped with
windows to view the production floor.
However, the view of the bottling
operation from the operations control
room is commonly blocked by pallets of
empty bottles awaiting introduction into
the bottling equipment.
It is not practical for Facility C to lock
the surge tank lid because workers need
to frequently check the status of product
flow and take quality control samples.
Also, it is not practical to physically
limit access to the ladder or walkway
used to access the surge tank, for the
same reasons. One approach for Facility
C to significantly minimize or eliminate
the significant vulnerability at this
actionable process step is to implement
the following focused mitigation
strategies:
• Implement a policy to prohibit all
personnel not associated with the
bottling operation from entering the area
and issue uniforms of a particular color
to the bottling personnel only. The staff
working in the bottling area would
enforce this policy by instructing any
staff not associated with the bottling
operation to leave the area.
• Prohibit staff working in the
bottling area from bringing any items
not associated with the bottling
operation into the work area.
• Train the staff working in the
bottling area in a peer monitoring
program to be attentive to the activity of
other staff in the area.
• Stage pallets of empty bottles
awaiting introduction into the bottling
equipment in another location to
improve line of sight from the
operations control room.
By implementing these focused
mitigation strategies, the facility could
significantly minimize or eliminate the
significant vulnerability associated with
the actionable process step at the liquid
surge tank.
Secondary ingredient handling—
Ingredient staging at Facility D is an
actionable process step for this key
activity type. Facility D opens a
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
containerized secondary ingredient’s
tamper evident package, measures out
the required amount into a secondary
container, and pre-positions the
ingredient in the production area so that
it is readily added to the product line.
Access to the food during each of these
activities at this actionable process step
presents a significant vulnerability.
Facility D stages a dry, powdered
ingredient near the mixer the night
before it is intended to be used so that
it is ready when the production run
begins the next morning. Additionally,
the staging area in Facility D is
accessible to all staff and is an open area
on the production floor.
One approach for Facility D to
significantly minimize or eliminate the
significant vulnerability at this
actionable process step is to implement
the following focused mitigation
strategies:
• Reduce staging time, by revising its
procedures so that ingredients are
staged immediately before they are
added into the product stream. This
strategy would reduce the time
ingredients are accessible.
• Change its staffing procedures to
ensure that only senior or long-term
employees are assigned to measuring
and staging secondary ingredients.
Assigning the most trusted employees to
work in sensitive areas reduces the risk
of intentional contamination.
• Increase its observation of this area
by installing closed-circuit TV cameras
to monitor the actions of staff in the
secondary ingredient staging area.
By its nature, the action of ingredient
staging is an open and accessible
process step. Focused mitigation
strategies must address personnel access
so that the likelihood of an intentional
contamination at this step is
significantly reduced or eliminated. By
implementing these focused mitigation
strategies, the facility could significantly
minimize the significant vulnerability
identified at the actionable process step.
Mixing and similar activities—
Blending in Facility E’s dough mixer is
an actionable process step for this key
activity type. Facility E operates a
dough mixer to combine several dry and
liquid ingredients. This mixer is not
enclosed and is located in an open area
of the facility where it is under
regular—though not dedicated—human
observation. While a batch of product is
being mixed, the staff member assigned
to the mixer may leave the area to
retrieve and prepare ingredients for the
next production batch. The line of sight
in this area is clear, and management in
the operations control room located
above the production floor has a clear
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
view of the mixer through an
observation window.
The mixer is vulnerable to an attacker
who could intentionally introduce a
contaminant into the food because of
the open nature of the mixer, the lack
of constant and dedicated observation,
and the lack of physical access control
to the area where it is located. One
approach for Facility E to significantly
minimize or eliminate the significant
vulnerability at this actionable process
step is to implement the following
focused mitigation strategies:
• Install a lid on the mixer that must
be opened to add anything to the mixer.
If Facility E determines that it would be
disruptive to the production schedule to
install a lock on the lid, the facility
could install an access alarm that would
indicate that the lid has been opened.
This alarm would sound in the
operation control room where a manager
supervises production operations.
• Assign another member of staff the
responsibility of preparing and securely
staging ingredients for later production
batches. This would alleviate the need
for the mixer operator to leave the area,
leaving the mixer unattended.
With the introduction of these two
focused mitigation strategies, the facility
would have taken steps to enclose the
mixer, making it more difficult for an
attacker to introduce a contaminant
without alerting management (by the
sounding of the alarm), and increased
the dedicated observation of this
otherwise vulnerable process step by
ensuring that the mixer operator is not
required to leave the area unattended.
Mixing at Facility F’s rotating air
dryer is another example of an
actionable process step for the key
activity type ‘‘Mixing and similar
activities.’’ In Facility F, product, such
as crackers or breakfast cereals, are fed
through drum-like equipment, where
warm air is blown across it while the
drum rotates. Although the goal of this
process is to dry the product, it also
could distribute any contaminant
introduced into the dryer evenly across
the product. Facility F’s rotating air
dryer is located alongside a commonly
used walkway, but is behind a guard rail
to prevent employees from coming in
contact with the hot exterior of the
dryer. Product is fed into the top of the
dryer via a pneumatic conveyor. There
is sufficient space between the dryer
opening and the pneumatic conveyor
discharge to enable an attacker to
introduce a contaminant to the dryer at
this point. That opening is about six feet
above the ground, accessible from the
floor of the facility. Product leaves the
dryer through a gravity fed line. The
PO 00000
Frm 00035
Fmt 4701
Sfmt 4702
78047
connection between the dryer and the
discharge line is sealed.
To goal of focused mitigation
strategies at this actionable process step
would be to reduce access to this
equipment to significantly reduce the
likelihood an attacker could introduce a
contaminant into the rotating air dryer.
One way Facility F could do this would
be to install a clear plastic shield that
would be affixed to and extend from the
discharge of the pneumatic conveyor to
the opening of the dryer where it would
also be tightly affixed to the housing of
the dryer. A clear plastic shield would
enable workers to supervise the product
flow into the dryer while posing as an
effective barrier to an attacker wishing
to introduce a contaminant into the
product at the dryer. This engineering
improvement would significantly
minimize or eliminate access to the food
in the dryer and thereby significantly
reduce or eliminate the likelihood of a
successful act of intentional
adulteration at this process step. The
installation of physical barriers to access
of equipment at actionable process steps
can be one of the most effective focused
mitigation strategies because it does not
require restricting personnel or
maintaining active observation of an
area. The implementation of this
engineering improvement would be
detailed in the facility’s food defense
plan.
c. Proposed § 121.135(a)—
Requirement to identify and implement
focused mitigation strategies for
actionable process steps. Proposed
§ 121.135(a) would require that the
owner, operator, or agent in charge of a
facility identify and implement focused
mitigation strategies at each actionable
process step to provide assurances that
the significant vulnerability at each step
will be significantly minimized or
prevented and the food manufactured,
processed, packed or held by such
facility will not be adulterated under
section 402 of the FD&C Act. Under
§ 121.135, we are proposing that, for
each of the identified actionable process
steps, the owner, operator, or agent in
charge of a facility covered by this rule
identify and implement focused
mitigation strategies. Focused mitigation
strategies would be required only for
actionable process steps.
Because a focused mitigation strategy
that would be necessary at an actionable
process step must be tailored to address
the significant vulnerability applicable
to the specific actionable process step,
we are not proposing to specify the
particular focused mitigation strategies
that would be appropriate. Rather, we
expect the owner, operator, or agent in
charge of the facility covered by this
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78048
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
rule to identify the specific focused
mitigation strategy(s) that would be
appropriate, considering the facility and
food it produces, and to ensure the
proper implementation of those
strategies to provide assurances that the
significant vulnerability at each
identified actionable process step is
significantly minimized or prevented
and the food is not adulterated. In
section V.C.3.b of this document, we list
examples of focused mitigation
strategies and describe scenarios for
determining appropriate focused
mitigation strategies at actionable
process steps for each of the FDAidentified key activity types.
A facility would have the flexibility to
identify and implement focused
mitigation strategies from among all
procedures, practices, and processes
available to the facility that would
provide the assurances that would be
required by proposed § 121.135. The
flexibility provided under this proposed
provision acknowledges the existing
expertise within the food industry in
this regard, and recognizes the complex
and varied nature of operations in food
facilities. Additionally, to the extent
facilities may already be engaging in
practices that constitute focused
mitigation strategies, facilities should
consider whether those measures satisfy
the requirements of proposed § 121.135,
such that the implementation of
additional focused mitigation strategies
may not be necessary. (Note that
associated requirements, such as
monitoring and verification, would
apply).
FDA’s existing guidance documents
and other resources (discussed in
section II.D of this document) include
guidance for industry on a range of
focused mitigation strategies. In
particular, the MSD includes a list of
mitigation strategies that can be applied
to different steps in a food operation to
reduce the risk of intentional
adulteration. The database is searchable
by key words and processing steps
common to food operations (e.g.,
packing, manufacturing, processing and
holding).
Proposed § 121.135(a) implements the
provisions in sections 418(c)(2) and
420(b)(2) of the FD&C Act. FDA requests
comments on our analysis and proposed
provisions related to mitigation
strategies necessary to protect against
intentional adulteration of food caused
by acts of terrorism. We also seek input
on whether and, to what extent,
facilities currently employ broad
mitigation strategies and focused
mitigation strategies.
d. Proposed § 121.135(b)—
Requirement for written focused
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
mitigation strategies. Proposed
§ 121.135(b) would require that focused
mitigation strategies for actionable
process steps be written. The focused
mitigation strategy(ies) selected for each
actionable process step identified in
accordance with proposed § 121.130,
and a justification for how the strategy
significantly reduces or eliminates the
risk of intentional adulteration at that
actionable process step(s) must be
documented. Similar to preventive
controls in a food safety plan, written
focused mitigation strategies in a food
defense plan are essential for the facility
to implement the focused mitigation
strategies consistently, and essential for
the facility and inspectors. Written
focused mitigation strategies also would
be essential for training purposes and
during reanalysis and updates of the
focused mitigation strategies.
Proposed § 121.135(b) implements the
provisions in sections 418(h) and
420(b)(2) of the FD&C Act.
e. Proposed § 121.135(c)—
Applicability of monitoring, corrective
actions, and verification. Proposed
§ 121.135(c) would specify that the
focused mitigation strategies required
under this section would be subject to
monitoring as would be required by
proposed § 121.140; corrective actions
as would be required by proposed
§ 121.145; and verification as would be
required by proposed § 121.150.
Proposed § 121.135(c)(1) through (c)(3)
would restate the requirements of
proposed §§ 121.140, 121.145, and
121.150 to clearly communicate the
applicability of proposed §§ 121.140,
121.145, and 121.150 to the focused
mitigation strategies that would be
required under proposed § 121.135 and
would establish no new requirements.
4. Monitoring
a. General description of monitoring.
Proposed § 121.3 would define
‘‘monitor’’ to mean ‘‘to conduct a
planned sequence of observations or
measurements to assess whether
focused mitigation strategies are
consistently applied and to produce an
accurate record for use in verification.’’
In developing the proposed monitoring
requirements related to food defense, we
considered our proposed monitoring
requirements related to food safety,
which are described in section XII.E of
the PC proposed rule. For the same
reasons outlined in the PC proposed
rule, we have tentatively concluded that
monitoring is necessary to establish the
performance of the implementation of
the focused mitigation strategies. The
proposed provisions in § 121.140
implement section 418(h) of the FD&C
Act.
PO 00000
Frm 00036
Fmt 4701
Sfmt 4702
b. Proposed § 121.140(a)—
Requirement for written procedures for
monitoring. Proposed § 121.140(a)
would require that the owner, operator,
or agent in charge of a facility establish
and implement written procedures,
including the frequency with which
they are to be performed, for monitoring
the focused mitigation strategies.
Monitoring the performance of focused
mitigation strategies at specified
frequencies would facilitate tracking the
implementation of the focused
mitigation strategies to provide
assurance that they are consistently
applied in a facility covered by this rule.
If monitoring shows that a focused
mitigation strategy is frequently not
implemented, a facility can consider
whether another focused mitigation
strategy would be more appropriate. For
example, if an ingredient storeroom
door is to be kept locked when not in
use, but the door is frequently left
unlocked because access to the room is
needed for other purposes, the facility
may replace the previous focused
mitigation strategy with video
monitoring. Further, if monitoring is
conducted with sufficient frequency, it
will detect if a focused mitigation
strategy is not properly implemented
(e.g., if access to a particular area of a
facility is not being appropriately
restricted or a bulk liquid tank is not
being visually inspected prior to filling),
indicating a problem and signaling the
need for an appropriate corrective
action. In addition, the proposed
monitoring requirement would result in
written documentation for use in
verification.
c. Proposed § 121.140(b)—Frequency
of monitoring. Proposed § 121.140(b)
would require that the owner, operator,
or agent in charge of a facility monitor
the focused mitigation strategies with
sufficient frequency to provide
assurances that they are consistently
applied. Proposed § 121.140(b) does not
specify a single monitoring frequency
applicable to all facilities and processes.
Rather, it requires monitoring with
‘‘sufficient frequency’’ to ensure that the
focused mitigation strategies are
consistently applied in a facility
covered by this rule. We note that for
food defense that many focused
mitigation strategies may be monitored
over longer timeframes (non-continuous
monitoring) than preventive controls for
food safety, which are often monitored
continuously. In large part preventive
controls for food safety are monitored
continuously because they relate to
physical or chemical parameters of the
process, such as the temperature of a
pasteurizer, which both lend themselves
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
to continuous monitoring and
necessitate that level of monitoring to
ensure that the process is under control.
As discussed in greater detail in section
V.C.3 of this document, most focused
mitigation strategies for food defense are
not related to physical or chemical
parameters of the process. They tend to
have more in common with sanitation
preventive controls for food safety in
that they relate to conditions around the
food process, such as access to the
equipment. A focused mitigation
strategy such as ‘‘adequate lighting at an
actionable process step’’ or ‘‘secure air
vents on a cooling tank with one-way
valves’’ would not require continuous
monitoring. Management may choose to
monitor lighting on a weekly basis to
ensure that everything is working
properly and monitoring of the security
of air vents with one-way valves on a
cooling tank might be done monthly.
Frequency is not prescribed in this
proposed rule. More frequent (e.g.,
daily) monitoring would be appropriate
for mitigation strategies that relate to
conditions or practices that are more
likely to change more rapidly, such as
keeping the access door to an actionable
process step closed when not in use or
ensuring that employees with color
coded uniforms are staying in the areas
designated by the color code.
d. Proposed § 121.140(c)—
Requirement for records. To implement
section 418(g) of the FD&C Act,
proposed § 121.140(c) would require
that all monitoring of focused mitigation
strategies in accordance with this
section must be documented in records
that are subject to verification in
accordance with § 121.150(a) and
records review in accordance with
proposed § 121.150(c).
The monitoring records would be
used to verify that the focused
mitigation strategies are being
monitored, as would be required by
proposed § 121.150(a), and to verify that
the focused mitigations strategies are
consistently implemented and are
effective at significantly minimizing or
preventing the significant
vulnerabilities, as would be required by
proposed § 121.150(c). Further, they are
necessary to facilitate regulatory review
of the system of controls. Together,
proposed §§ 121.140(a), (b), and (c) and
121.150(a), (c), and (e) would establish
a system that would provide assurances
that the significant vulnerabilities
identified for a food operation are being
significantly minimized or prevented.
5. Corrective Actions
a. General description of corrective
actions. When a HACCP-type system is
applied to ensure food safety, the term
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
‘‘corrective actions’’ is used to describe
procedures that are in place to correct
the cause of a deviation to ensure that
a critical control point is under control
and to ensure that the product produced
under that deviation is safe, since total
adherence to a planned process may not
always occur. This concept is discussed
in detail in section XII.F of the PC
proposed rule.
This same concept can be applied to
the control of intentional adulteration
related to acts of terrorism. Monitoring
may detect a deviation from
implementation of a focused mitigation
strategy; corrective actions are
implemented to re-establish control. In
developing the proposed corrective
actions requirements related to food
defense, we considered our proposed
relevant requirements related to food
safety. The proposed provisions in
§ 121.145 implement sections 418(e),
418(h), and 420(b)(2) of the FD&C Act.
b. Proposed § 127.145(a)—Corrective
action procedures. Proposed
§ 121.145(a)(1) would require that the
owner, operator, or agent in charge of a
facility establish and implement written
corrective action procedures that must
be taken if focused mitigation strategies
are not properly implemented. Having
written procedures in place would
enable facilities covered by this rule to
act quickly and appropriately when
focused mitigation strategies are not
properly implemented—e.g., a situation
where a work station at an actionable
process step requires two staff at all
times in a ‘‘buddy system’’ but is only
staffed by one person for a period of
time.
The benefits of identifying corrective
action procedures before corrective
action is needed largely derive from
having written procedures. Written
corrective action procedures would be
essential to the facility’s management, to
auditors, and to inspectors. The
facility’s management will be
responsible for ensuring that
appropriate corrective actions are taken
if focused mitigation strategies are not
properly implemented. Having access to
appropriate, written corrective action
procedures determined in advance of
the need for such action can ensure that
correct and complete actions are taken
in a timely fashion. Having written
corrective action procedures available
for auditors and for inspectors is
essential for them to assess the
adequacy of the food defense plan; the
procedures a facility will use to address
implementation failures are essential to
proper, consistent implementation, and
without them a complete assessment
cannot be made. Written corrective
action procedures also will be useful for
PO 00000
Frm 00037
Fmt 4701
Sfmt 4702
78049
training purposes, so that employees
who would need to implement the
corrective action procedures will be
prepared for what they would need to
do.
Proposed § 121.145(a)(2) would
require that corrective action procedures
describe the steps to be taken to ensure
that appropriate action is taken to
identify and correct a problem with
implementation of a focused mitigation
strategy to reduce the likelihood that the
problem will recur. In the previous
example in which two staff are required
to be at a work station at all times, the
corrective action could be speaking with
the employees to ensure they
understand the importance of remaining
at the work station together, sending
staff to a refresher course on food
defense awareness, and ensuring that
the supervisor knows that there must be
adequate staff present on a shift so two
people can be at the work station at all
times. If the problem recurs,
management may need to consider other
measures for preventing access at that
process step.
c. Proposed § 121.145(b)—
Documentation. Proposed § 121.145(b)
would require that all corrective actions
taken in accordance with this section be
documented in records that are subject
to verification in accordance with
proposed § 121.150(b) and records
review in accordance with proposed
§ 121.150(c). The records that document
corrective actions would be used to
verify that appropriate decisions about
corrective actions are being made and
appropriate corrective actions are being
taken in facilities covered by this rule.
d. Corrective actions proposed to be
required by part 117 but not part 121.
Unlike in proposed part 117, in
proposed part 121, we have not
proposed a requirement to ensure that
all affected food is evaluated for food
safety if focused mitigation strategies are
not properly implemented or are found
to be ineffective. An act of intentional
adulteration or attempted intentional
adulteration has historically been a rare
event and, as a result, in the vast
majority of cases, the failure to properly
implement a focused mitigation strategy
would not be expected to result in
contaminated food. This is because
intentional adulteration requires not just
the opportunity for contamination (i.e.,
failure of a mitigation strategy to limit
access to an actionable process step),
but also someone with intent to cause
harm at that same moment. In contrast,
the failure to properly implement a
preventive control for a food safety
hazard, such as proper cook
temperatures, is more likely to result in
adulterated food (e.g., because the
E:\FR\FM\24DEP2.SGM
24DEP2
78050
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
pathogen reasonably likely to be present
in the raw food would not be eliminated
from the food by the inadequate cooking
process). However, our decision not to
propose these requirements does not
absolve an owner, operator, or agent in
charge of a facility from their
responsibility to ensure that food is not
adulterated. In addition, food firms
would continue to be subject to the
reporting requirements under section
417 of the FD&C Act. Moreover, the
introduction or delivery for introduction
into interstate commerce of any food
that is adulterated is a prohibited act
under section 301(a) of the FD&C Act.
The PC proposed rule also contains
requirements for corrective actions that
must be taken in the event of an
unanticipated problem. Unlike in
proposed part 117, in proposed part
121, we are not proposing a requirement
related to unanticipated problems
because we are not aware of
circumstances where this would be
relevant. Because of the nature of the
focused mitigation strategies, we expect
that the outcomes of monitoring will be
binary, either the focused mitigation
strategy will be in place or it will not
be in place. For this reason, we expect
that corrective action plans will be
straightforward, with no provision
needed for unanticipated corrective
actions. This contrasts with the
circumstances of food safety preventive
measures, where controls are often more
complex, presenting opportunities for a
more nuanced corrective action, which
may not be possible to fully anticipate
in advance.
We ask for comment on our rationale
and tentative conclusion not to propose
these requirements.
sroberts on DSK5SPTVN1PROD with PROPOSALS
6. Verification
a. General description of verification.
In the preventive controls framework,
‘‘verification’’ involves activities that
help determine whether the focused
mitigation strategies are valid and are
implemented according to the food
defense plan. Verification includes
confirming that monitoring and
corrective actions are being
implemented as planned, through
review of records and periodic
reanalysis of the food defense plan. This
concept as applied to food safety is
discussed in detail in section XII.G of
the PC proposed rule.
We have tentatively concluded that
this same concept applies to the control
of intentional adulteration related to
acts of terrorism. Efforts must be made
to ensure that the system of mitigation
strategies is in place and functioning as
designed. The proposed provisions in
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
§ 121.150 implement sections 418(f) and
420(b)(2) of the FD&C Act.
b. Proposed § 121.150(a)—Verification
of monitoring. Proposed § 121.150(a)
would require that the owner, operator,
or agent in charge of a facility verify that
monitoring is being conducted.
Verification of monitoring can be
conducted in a number of ways. One
example of verification of monitoring is
a periodic observation of the monitoring
activity, e.g., by a supervisor. Another
example is an independent test made by
a person other than the person doing the
monitoring. For example, if a shift
supervisor is assigned to check at the
end of each shift that chemicals are
properly stored and secured, another
supervisor may be responsible for
checking periodically (e.g., once a week)
that this is occurring. In another
example, if an alarm is supposed to
sound if a mixing tank is accessed
without authorization and the
monitoring procedures provide for
weekly testing of the alarm, a supervisor
may be responsible for performing the
same test monthly to ensure that the
alarm and the monitoring procedure are
both working properly. Proposed
§ 121.150(a) would not specify the
verification activities that must be
conducted for monitoring. We request
comment on whether proposed
§ 121.150(a) should do so, and if so,
what verification activities should be
required.
c. Proposed § 121.150(b)—Verification
of corrective actions. Proposed
§ 121.150(b) would require that the
owner, operator, or agent in charge of a
facility verify that appropriate decisions
about corrective actions are being made.
An example of verification that
appropriate decisions about corrective
actions are being made is observation of
the corrective actions being taken, e.g.,
by a supervisor. Proposed § 121.150(b)
would not specify the verification
activities that must be conducted for
corrective actions. We request comment
on whether proposed § 121.150(b)
should do so, and if so, what
verification activities should be
required.
d. Proposed § 121.150(c)—
Implementation and effectiveness.
Proposed § 121.150(c) would require
that the owner, operator, or agent in
charge of a facility verify that the
focused mitigation strategies are
consistently implemented and are
effectively and significantly minimizing
or preventing the significant
vulnerabilities. As appropriate to the
facility and the food, this must include
review of the monitoring and corrective
action records within appropriate
timeframes to ensure that the records
PO 00000
Frm 00038
Fmt 4701
Sfmt 4702
are complete, the activities reflected in
the records occurred in accordance with
the food defense plan, the focused
mitigation strategies are effective, and
appropriate decisions were made about
corrective actions.
Proposed § 121.150(c) would establish
that the purpose of the review of records
is to ensure that the records are
complete, the activities reflected in the
records occurred in accordance with the
food defense plan, the focused
mitigation strategies are effective, and
appropriate decisions are made about
corrective actions. We tentatively
conclude that review of the records
required by proposed § 121.150(c)
would accomplish these purposes.
Reviewing monitoring records can
reveal whether they contain information
on all of the activities or measures that
were to be monitored to determine
whether a focused mitigation strategy is
being consistently implemented in
accordance with the food defense plan.
For example, a review of monitoring
records can show if the shift supervisor
is consistently storing and securing
chemicals at the end of each shift as
may be required by a food defense plan.
Review of monitoring records also can
reveal whether any information is
missing—e.g., a date or time—so that
the missing information can be quickly
identified and added to the record if
necessary.
Review of records also can reveal
whether appropriate decisions were
made about corrective actions. The
review would determine whether all the
corrective action procedures required by
proposed § 121.145 have been followed
to prevent recurrence of the problem.
For example, in the previous example
on corrective actions, a review of
records could reveal that the supervisor
spoke to the staff about always having
two staff present at the work station as
required in the food defense plan and,
as appropriate, enrolled the staff in a
refresher course on food defense
awareness.
Proposed § 121.150(c) would require
review of the monitoring and corrective
action records within an appropriate
time after the records are made. We are
not proposing to require review of
records within a specified timeframe.
While the PC proposed rule contains a
requirement that monitoring and
corrective action records be reviewed
within a week after the records are
made, in the case of food defense, we do
not believe specifying a timeframe for
records review is necessary. As
discussed previously, some focused
mitigation strategies may be monitored
less frequently than are preventive
controls for food safety. In a HACCP-
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
type system for food safety, monitoring
and corrective action records are often
reviewed a short time after their
creation to enable action to be taken
relative to food that may be adulterated
(e.g., recall). It is unlikely that an
improperly implemented focused
mitigation strategy would result in
adulterated food (i.e., because
adulteration of food would require not
only opportunity but also a
simultaneous intent to cause
adulteration). A focused mitigation
strategy such as ‘‘adequate lighting at
the bulk truck unloading bay’’ or
‘‘secure air vents on a cooling tank with
one-way valves’’ may be monitored on
a weekly or monthly basis. Because the
focused mitigation strategies may be
monitored less frequently and because
these frequencies may vary significantly
from one focused mitigation strategy to
another, we believe it is appropriate for
owners, operators, or agents in charge of
a facility to determine when review of
the monitoring and corrective action
records is best performed.
e. Proposed § 121.150(d)—Reanalysis.
To implement section 418(i) of the
FD&C Act, proposed § 121.150(d)(1)
would require that the owner, operator,
or agent in charge of a facility conduct
a reanalysis of the food defense plan as
follows:
1. At least once every 3 years
(proposed § 121.150(d)(1)(i)).
2. Whenever a significant change is
made in the activities conducted at a
facility operated by such owner,
operator, or agent in charge if the
change creates a reasonable potential for
a new vulnerability or a significant
increase in a previously identified
vulnerability (proposed
§ 121.150(d)(1)(ii)). For example, if a
facility adds a new product line, then
the food defense plan must be
reanalyzed to consider whether it
includes one of the key activity types,
and, if so to implement appropriate
focused mitigation strategies.
3. Whenever such owner, operator or
agent in charge becomes aware of new
information about potential
vulnerabilities associated with the food
operation or facility (proposed
§ 121.150(d)(1)(iii)). For example, an
owner, operator, or agent in charge of a
facility may become aware that access to
a particular piece of equipment is
greater than was thought to be the case
when they initially considered whether
a key activity type is applicable to their
food process.
4. Whenever a focused mitigation
strategy is found to be ineffective
(proposed § 121.150(d)(1)(iv)). Proposed
§ 121.150(d)(1)(iv) would require that
the owner, operator, or agent in charge
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
of a facility reanalyze the food defense
plan to determine whether modification
of the plan is required if a focused
mitigation strategy is found to be
ineffective. For example, if the owner,
operator, or agent in charge of a facility
finds that color coding of employee hard
hats according to their assigned work
stations or areas is not effective in
preventing employees from crossing
into areas where they are not assigned
because employees have found that
adhering to the system adversely affects
product, the owner, operator, or agent in
charge may need to consider other
focused mitigation strategies to ensure
that staff access at actionable process
steps is controlled.
5. Whenever FDA requires reanalysis
to respond to new vulnerabilities and
developments in scientific
understanding including, as
appropriate, results from a DHS
biological, chemical, radiological, or
other terrorism risk assessment
(proposed § 121.150(d)(1)(v)). Risk
assessments or vulnerability
assessments conducted by DHS or
others may reveal a significant
vulnerability in process steps in
addition to the significant
vulnerabilities associated with the key
activity types that FDA has identified.
FDA would require reanalysis of food
defense plans, as necessary, to respond
to any new knowledge about threats or
vulnerabilities to food operations based
on information available to the agency.
This requirement for reanalysis could
involve a requirement to consider
whether a new key activity type is
relevant to a facility’s food processes. It
could also involve a requirement to
reconsider existing key activity types in
light of a credible threat of terrorist
attack on a specific food type, product,
brand, or company.
Proposed § 121.150(d)(2) would
require that the owner, operator, or
agent in charge of a facility complete the
required reanalysis and implement any
additional focused mitigation strategies
needed to address the significant
vulnerabilities identified, if any, before
the change in activities at the facility is
operative or, when necessary, during the
first six weeks of production. The
purpose of the reanalysis is to identify
the need for, and implement, focused
mitigation strategies in light of a
reasonable potential for a new
significant vulnerability, or a significant
increase in a previously identified
significant vulnerability.
Proposed § 121.150(d)(3) would
require that the owner, operator, or
agent in charge of a facility revise the
written plan if a significant change is
made or document the basis for the
PO 00000
Frm 00039
Fmt 4701
Sfmt 4702
78051
conclusion that no additional or revised
focused mitigation strategies are needed.
It is important to document that a
reanalysis has been conducted and the
plan has been revised accordingly or
that no change has been made. Such
documentation demonstrates that a
facility has considered all relevant
information on the defense of the
operation, including new information
that has become available since the last
analysis. The documentation further
demonstrates that appropriate changes
have been made or that current
procedures for implementing focused
mitigation strategies are adequate to
significantly minimize or prevent
significant vulnerabilities.
f. Proposed § 121.150(e)—
Requirement for records for verification.
To implement sections 418(g) and
420(b)(2) of the FD&C Act, proposed
§ 121.150(e) would require that all
verification activities taken in
accordance with this section be
documented in records.
g. Verification proposed to be
required by part 117 but not part 121.
In the PC proposed rule, we proposed to
require, as part of verification, the
validation of the adequacy of the
preventive controls implemented to
control the hazards identified in the
hazard analysis as reasonably likely to
occur. In this proposed rule, we are not
including a similar proposed
requirement. Unlike preventive
controls, which often involve processing
parameters that can be scientifically
validated, focused mitigations strategies
for food defense (which correspond to
preventive controls for food safety) often
are not of a nature that they can be
scientifically validated. For example, it
would not be practical for a facility to
attempt to validate the effectiveness of
a lock on a tank or the use of a ‘buddy
system’ at a particular process step to
prevent or significantly minimize
intentional adulteration of food caused
by a terrorist attack. Most of the
recommended mitigation strategies in
the MSD (Ref. 30) are similar in nature
to the two mentioned in the example
above in that validation would be
impractical. Therefore, we have
tentatively concluded not to propose a
requirement for validation of focused
mitigation strategies.
However, if a facility chooses to use
a processing parameter (e.g., thermal kill
step) as a focused mitigation strategy,
the facility should employ such a
processing parameter if it has been
demonstrated to be effective in
significantly minimizing or preventing
the associated significant vulnerability.
In many circumstances it is not
appropriate to use such strategies
E:\FR\FM\24DEP2.SGM
24DEP2
78052
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
because they are usually effective
against one or several, but not all,
potential contaminants. See section
XII.G of the PC proposed rule for
additional discussion of validation.
The PC proposed rule also includes
proposed requirements for calibration of
process monitoring instruments and
verification instruments and also
records associated with these activities.
As discussed previously, it is our
expectation that most of the focused
mitigation strategies will not be
continuously monitored and will not
require process monitoring instruments
or instruments to verification purposes.
Therefore, we do not believe it would be
necessary to include those requirements
in this part.
We ask for comment on our tentative
decision not to include validation of the
focused mitigation strategies and
calibration of monitoring and
verification instruments in codified
requirements in proposed § 121.150.
7. Training of Personnel
Proposed § 121.160 would establish
requirements related to training of
certain personnel working in a food
operation. Proposed § 121.160(a) would
require that personnel and supervisors
assigned to actionable process steps
receive appropriate training in food
defense awareness and their respective
responsibilities in implementing
focused mitigation strategies. Because
the effectiveness of a mitigation strategy,
which is applied at an actionable
process step, is dependent on the proper
implementation by personnel and
supervisors of the strategy, we are
proposing to require that personnel and
supervisors assigned to actionable
process steps be appropriately trained in
food defense. The purpose of training a
supervisor, in addition to personnel at
actionable process steps, is so that the
supervisor can help train employees,
recognize conditions that could lead to
intentional contamination, and take
necessary actions to correct those
conditions.
We are proposing that training
required under this provision must
cover food defense awareness and the
respective responsibilities of personnel
and supervisors assigned to actionable
steps in implementing focused
mitigation strategies. At a minimum,
such training must include the general
principles of food defense, including
simple procedures for employees to
follow to adhere to those principles in
their jobs. We have tentatively
concluded that completion of FDA’s
training course on Food Defense
Awareness for the Front-line Employee
(described in this section of the
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
document), which takes about 20
minutes to complete, would be
sufficient to satisfy this element of the
proposed training requirement.
Additionally, training must contain
specifics about the actionable process
steps where employees are working and
their roles in the proper implementation
of the focused mitigation strategy(ies)
applied at those actionable process
steps. Training on the application of
focused mitigation strategies, which is
likely to be specific to each facility or
actionable process step, may be added
to existing on-the-job training programs
or provided separately.
FDA has developed training tools that
are available for use by the industry.
FDA revamped its online food defense
courses in 2013, and the revamped
courses, entitled ‘‘Food Defense 101’’
(Ref. 27), address the types of
intentional contamination that have
occurred in the United States in recent
years and reflect FDA’s current thinking
on how to minimize the likelihood and
impact of such incidents. The courses
included in Food Defense 101 are: (1)
Food Defense Awareness for the Food
Professional; (2) Food Defense
Awareness for the Front-line Employee;
(3) Food Defense Regulations; and (4)
ALERT, for owners and operators of
food facilities. The course on Food
Defense Awareness for the Food
Professional provides an understanding
of food defense and information for
professionals in the food industry. The
course modules progress through food
defense planning including broad
mitigation strategies, vulnerability
assessments, focused mitigation
strategies, and food defense plans. The
course on Food Defense Awareness for
Front-line Employees provides
information specific to front-line
workers and simple procedures for these
employees to follow in food defense.
The course on Food Defense Regulations
presents an overview of the Public
Health Security and Bioterrorism
Preparedness and Response Act of 2002
(the Bioterrorism Act), FSMA, and
FDA’s Reportable Food Registry.
Finally, the course on ALERT, which
was developed by FDA to help
stakeholders better understand food
defense and how food defense applies to
the food industry, provides specific
examples of ways to protect a firm from
the threat of intentional contamination.
FDA’s Food Defense 101 online courses
are available free-of-charge on our Web
site at https://www.fda.gov/Food/
FoodDefense/default.htm.
We expect these existing courses will
assist industry to comply with this
training requirement, if finalized as
proposed. We are also aware of training
PO 00000
Frm 00040
Fmt 4701
Sfmt 4702
seminars and programs offered by
private sector entities (Ref. 59, Ref. 60,
Ref. 61, Ref. 62) that may also assist
industry to comply with this training
requirement. We seek comment on the
adequacy of FDA’s Food Defense 101
training materials, and whether there is
a need for revisions to these existing
FDA courses or the development of
additional FDA training materials.
FDA also previously issued guidance
documents for industry on food defense
(Ref. 22, Ref. 23, Ref. 24, Ref. 25, Ref.
26), which include recommendations
related to personnel training. In these
guidance documents, we recommended
that all employees have training in food
defense awareness, including
information on how to prevent, detect,
and respond to an intentional
contamination incident at their facility.
As noted in these guidance documents,
we recommended incorporating
periodic reminders of the importance of
food defense procedures into routine
facility communications, such as
brochures, staff meetings or payroll
stuffers. We further recommended that
facilities encourage all employees to
report unusual or suspicious
individuals or activities to management.
We reiterate these recommendations
described in our guidance documents.
However, in this proposed rule, we are
not proposing to include additional
specific training requirements to reflect
all of those recommendations. For
example, although we are not requiring
that all employees at a facility receive
training in food defense, we recognize
the importance of training as a measure
to protect against intentional
adulteration of food and, therefore,
reiterate our recommendation that all
personnel working in a food operation
receive training in food defense
awareness. We request comment on this
issue, including on whether we should
require, in a final rule, that basic food
defense awareness training be
completed by all employees at a facility.
We also request comment on whether
we should require training to be
repeated periodically, including when
significant changes are made to food
defense plans.
Proposed § 121.160(b) would require
that all training received in accordance
with section § 121.160 be documented
in records. Under proposed § 121.305,
records would include such information
as the date of the training, the topics
covered, and the person(s) trained. An
example of records that would comply
with proposed § 121.160(b) is an
attendance sheet with the date, list of
those in attendance, and the particular
topics covered (such as an overview of
food defense principles or food defense
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
planning). The records required by
proposed § 121.160(b) would enable a
facility to track the training that
personnel received, thereby enabling
identification of personnel that have the
prerequisite awareness training for an
assignment at an actionable process
step. Such records could be used to
document that a person has, as would
be required under proposed
§ 121.160(a), successfully completed
training appropriate to the person’s
duties at an actionable process step.
We recognize that industry has
already begun to implement food
defense measures to meet certain
industry standards, which include
guidelines for food defense training
(Ref. 63, Ref. 33, Ref. 35). Our proposed
minimum requirements for training are
consistent with these standards, as well
as with WHO recommendations for
personnel training in its guidance on
food defense (Ref. 6). We seek comment
on the feasibility of our proposed
training requirements, in light of the
current state of food defense awareness
in the industry and available training
resources.
sroberts on DSK5SPTVN1PROD with PROPOSALS
D. Requirements Applying to Records
That Must Be Established and
Maintained
When a HACCP-type system is
implemented for food safety, records are
a critical part of the system because they
aid facilities in compliance with the
requirements, including all the elements
of a food safety plan as proposed in Part
117, and allow facilities to show, and
FDA to determine, compliance with the
requirements. This concept is discussed
in detail in section XV of the PC
proposed rule. We have tentatively
concluded that records are critical to
protect food from intentional
adulteration caused by acts of terrorism.
In subpart D of proposed part 121,
FDA is proposing to establish
requirements applying to records that
must be established and maintained
according to the requirements of this
proposed rule. This subpart implements
numerous provisions in section 418 of
the FD&C Act, including sections 418(a),
(b)(3), (g), (h), and (n)(1)(A), as well as
section 420(b) of the FD&C Act.
1. Proposed § 121.301—Records Subject
to the Requirements of this Subpart D
Proposed § 121.301(a) would establish
that, except as provided by proposed
§ 121.301(b), all records required by
proposed subpart C of part 121 would
be subject to all requirements of
proposed subpart D. We have tentatively
concluded that the requirements in
subpart D describing how records must
be established and maintained,
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
including the general requirements,
record retention requirements, and
requirements for official review and
public disclosure, are applicable to all
records that would be required under
subpart C. Such records would aid
facilities in compliance with the
requirements of proposed part 121, and
allow facilities to show, and FDA to
determine, compliance with the
requirements of part 121. The proposed
requirements of subpart D are discussed
in this document.
Proposed § 121.301(b) would establish
that the requirements of proposed
§ 121.310 apply only to the written food
defense plan and is discussed in more
detail in section V.D.3 of this document.
2. Proposed § 121.305—General
Requirements Applying to Records
Proposed § 121.305 contains general
requirements that would apply to
records that would be required under
proposed part 121, including the format
for required records, the recording of
actual values and observations obtained
during monitoring, when records must
be created, and information that must be
included in each record.
a. Proposed § 121.305(a). Proposed
§ 121.305(a) would require that the
records be kept as original records, true
copies (such as photocopies, pictures,
scanned copies, microfilm, microfiche,
or other accurate reproductions of the
original records), or electronic records.
True copies of records should be of
sufficient quality to detect whether the
original record was changed or
corrected in a manner that obscured the
original entry (e.g., through the use of
white-out). Proposed § 121.305(a) would
provide flexibility for mechanisms for
keeping records while maintaining the
integrity of the recordkeeping system.
The proposed requirement allowing true
copies provides options that may be
compatible with the way records are
currently being kept in facilities.
Proposed § 121.305(a) also would
require that electronic records be kept in
accordance with part 11 (21 CFR part
11). Part 11 provides criteria for
acceptance by FDA, under certain
circumstances, of electronic records,
electronic signatures, and handwritten
signatures executed to electronic
records as equivalent to paper records
and handwritten signatures executed on
paper. The proposed requirement
clarifies and acknowledges that records
required by proposed part 121 may be
retained electronically, provided that
they comply with part 11.
In the PC proposed rule, FDA
tentatively concluded that it would be
appropriate to apply the requirements of
part 11 to the records that would be
PO 00000
Frm 00041
Fmt 4701
Sfmt 4702
78053
required to be kept under proposed part
117. However, we requested comment
on whether there are any circumstances
that would warrant not applying part 11
to records that would be kept under
proposed part 117. In section XV.C of
that document, we provided examples
of circumstances in which we exempted
records from the requirements of part 11
(21 CFR 1.329(b)) to avoid the necessity
of establishing new recordkeeping
systems as long as current practices
would satisfy the requirements of the
Act. In the PC proposed rule, we also
asked for comment on whether we
should allow additional time for
electronic records to be kept in
accordance with part 11. We seek
similar comment with regard to
circumstances that would warrant not
applying part 11 to records that would
be kept under proposed part 121 and
whether we should allow additional
time for electronic records to be kept in
accordance with part 11. Comments
should provide the basis for any view
that the requirements of part 11 are not
warranted.
b. Proposed § 121.305(b). Proposed
§ 121.305(b) would require that records
contain the actual values and
observations obtained during
monitoring. For example, monitoring of
the locking of an access door to an
actionable process step could be
recorded as ‘‘locked’’ or ‘‘unlocked’’ (or
‘‘yes’’ or ‘‘no’’) and the monitoring of
the presence of staff with only
appropriate color uniforms in a
designated area could be recorded as
‘‘100% staff (or 10 of 10 staff) with blue
uniforms’’ or conversely ‘‘80% staff (or
8 of 10 staff) with blue uniforms’’ in the
case of an improperly implemented
focused mitigation strategy. In the case
of an improperly implemented focused
mitigation strategy, it is important to
document the extent to which the
strategy was incorrectly applied, as
monitoring data can show a trend
toward loss of control at an actionable
process step. So, in the example in
which 8 of 10 staff have blue uniforms,
a facility may also consider
documenting what color the remaining
two staff were wearing if such
information would be valuable in
establishing a trend. If the recording of
numerical values is possible in the
monitoring of a focused mitigation
strategy (e.g., if a facility is using a
processing parameter such as heat
treatment), then the actual times and
temperatures or other appropriate
processing data should be recorded.
c. Proposed § 121.305(c), (d) and (e).
Proposed § 121.305(c), (d) and (e) would
require that records be accurate,
indelible, and legible (proposed
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
78054
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
§ 121.305(c)); be created concurrently
with performance of the activity
documented (proposed § 121.305(d));
and be as detailed as necessary to
provide a history of work performed
(proposed § 121.305(e)). Proposed
§ 121.305(c) and (d) would ensure that
the records are useful to the owner,
operator, or agent in charge of a facility
in complying with the requirements of
proposed part 121, for example, in
documenting compliance with
monitoring requirements and verifying
compliance with the food defense plan.
These proposed requirements would
also ensure that the records would be
useful to FDA in determining
compliance with the requirements of
proposed part 121. Proposed
§ 121.305(e) would provide flexibility to
facilities to tailor the amount of detail
to the nature of the record.
d. Proposed § 121.305(f). Proposed
§ 121.305(f) would require that the
records include the following: (1) The
name and location of the facility; (2) the
date and time of the activity
documented; (3) the signature or initials
of the person performing the activity;
and (4) where appropriate, the identity
of the product and the production code,
if any. The name and location of the
facility and the date and time would
allow the owner, operator, or agent in
charge of a facility (and, during
inspection, an FDA investigator) to
assess whether the record is current, to
identify when and where any deviation
occurred, and to track corrective
actions. The signature of the individual
who made the observation would ensure
responsibility and accountability. In
addition, if there is a question about the
record, a signature would ensure that
the source of the record will be known.
Linking a record to a specific product
(and, when applicable, the production
code) would enable the owner, operator,
or agent in charge of a facility covered
by this rule to isolate product if there is
a question that food has been
adulterated. We seek comment on the
scope and potential burden associated
with these proposed requirements.
The proposed requirement (proposed
§ 121.305(f)(4)) for the identity of the
product and production code, if any, is
important in the context of food safety,
where the production of potentially
adulterated product may result from
loss of control during processing, such
as an improper cook temperature, and a
recall may be necessary. It is also
especially applicable for food safety in
cases of continuous monitoring, when
the loss of control can be associated
with a particular product or production
code. Consistent with the PC proposed
rule, we have qualified the proposed
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
requirement to indicate that the identity
of the product and the production code
should be included as part of the record
‘‘where appropriate.’’ We note that, in
many cases, it will likely be more
difficult to include this information for
a focused mitigation strategy. As noted
in the discussion on monitoring in
section V.C.5 of this proposed rule,
some focused mitigation strategies may
be monitored weekly or monthly. In that
case, it may not be appropriate to
include all of the products and
production codes that may have been
affected by an improperly implemented
focused mitigation strategy. Further, in
many cases the identity of the product
and the production code will not be
relevant because the monitoring will be
performed in the area surrounding one
or more production lines, used for one
or more products, rather than of
processing parameters on a production
line for a specific lot of product. On the
other hand, if control of processing
parameters, such as pasteurization time
and temperature, are used as a focused
mitigation strategy, it would be
appropriate to document the product
and production code, if any, that was
being processed at the time of
monitoring. The nature of the focused
mitigation strategy should drive the
decision by an owner, operator, or agent
in charge of a facility regarding whether
or not to include the identity of the
product and the production code, if any,
in records.
3. Proposed § 121.310—Additional
Requirements Applying to the Food
Defense Plan
Proposed § 121.310 would require
that the owner, operator, or agent in
charge of a facility sign and date the
food defense plan upon initial
completion (proposed § 121.310(a)) and
upon any modification (proposed
§ 121.310(b)). Such a signature would
provide direct evidence of the owner,
operator, or agent’s acceptance of the
plan and commitment to
implementation of the plan.
Additionally, the signature, along with
the date of signing, would serve to
minimize potential confusion over the
authenticity of any differing versions or
editions of the document that might
exist.
4. Proposed § 121.315—Requirements
for Record Retention
Proposed § 121.315 contains
requirements on the length of time
records that would be required under
proposed part 121 must be retained and
allowances for offsite storage of records
under certain circumstances.
PO 00000
Frm 00042
Fmt 4701
Sfmt 4702
a. Proposed § 121.315(a) and (b).
Proposed § 121.315(a) would require
that all records that would be required
by proposed part 121 be retained at the
facility for at least 2 years after the date
they were prepared. Proposed
§ 121.315(b) would require that the food
defense plan be retained at the facility
for at least 2 years after its use is
discontinued (e.g., because the facility
has updated the written food defense
plan. The 2-year timeframe for all
records required by proposed part 121 is
consistent with the length of time that
nonperishable food products, on
average, can be expected to be in
commercial distribution plus a
reasonable time thereafter to ensure that
the records are available for verification
activities. This proposed requirement is
similar to the proposed records
retention requirement in the PC
proposed rule, which contains a
discussion of similar requirements
found in other FDA regulations and in
particular the proposed and final rules
implementing the recordkeeping
requirements of the Bioterrorism Act.
This 2-year retention period would run
from either the date the record is
prepared, for day-to-day operational
records, or the date at which use of the
record is discontinued, for the food
defense plan. We seek comment on this
proposal.
b. Proposed § 121.315(c). Proposed
§ 121.315(c) would provide that, except
for the food defense plan, use of offsite
storage for records is permitted after 6
months following the date that the
record was made if such records can be
retrieved and provided onsite within 24
hours of request for official review. The
food defense plan would be required to
remain onsite. FDA realizes that the
proposed requirements for
recordkeeping could require some
facilities to store a significant quantity
of records, and that there may not be
adequate storage space in the facility for
all of these records. Providing for offsite
storage of most records after 6 months
would enable a facility to comply with
the proposed requirements for record
retention while reducing the amount of
space needed for onsite storage of the
records without interfering with the
purpose of record retention, because the
records will be readily available.
Proposed § 121.315(c) also would
provide that electronic records are
considered to be onsite if they are
accessible from an onsite location.
Computerized systems within
corporations can be networked,
allowing for the sending and receiving
of information in a secure fashion to all
of the different food processing facilities
of that corporation worldwide. This
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
type of system can be used to provide
access at multiple locations to records
from multiple facilities.
c. Proposed § 121.315(d). Proposed
§ 121.315(d) would provide that if the
facility is closed for a prolonged period,
the records may be transferred to some
other reasonably accessible location but
must be returned to the facility within
24 hours for official review upon
request. Allowing for transfer of records
will give practical storage relief to
seasonal operations or those closed for
other reasons for prolonged periods.
prohibited. Under section 301(ww) of
the FD&C Act, the following act, and the
causing thereof, are prohibited: ‘‘[t]he
failure to comply with section 420 [of
the FD&C Act].’’ To clearly
communicate that failure to comply
with the regulations established under
section 420 of the FD&C Act is a
prohibited act, proposed § 121.401(b)
would establish that the failure to
comply with section 420 of the FD&C
Act or subparts C or D of part 121 is a
prohibited act under section 301(ww) of
the FD&C Act.
5. Proposed § 121.320—Requirements
for Official Review
Proposed § 121.320 would require
that all records required by proposed
part 121 be made promptly available to
a duly authorized representative of the
Secretary of Health and Human Services
upon oral or written request.
VI. Preliminary Regulatory Impact
Analysis
sroberts on DSK5SPTVN1PROD with PROPOSALS
6. Proposed § 121.325—Public
Disclosure
Proposed § 121.325 would establish
that all records required by proposed
part 121 will be protected from public
disclosure to the extent allowable under
part 20 of this chapter. Our general
policies, procedures, and practices
relating to the protection of confidential
or otherwise protected information
received from third parties would apply
to information received under this rule.
E. Compliance
Section 103(e) of FSMA amends
section 301 of the FD&C Act (21 U.S.C.
331) by adding a new section—(uu)—to
the list of acts and the causing thereof
that are prohibited. Under section
301(uu) of the FD&C Act, the following
act, and the causing thereof, are
prohibited: ‘‘[t]he operation of a facility
that manufactures, processes, packs, or
holds food for sale in the United States
if the owner, operator, or agent in charge
of such facility is not in compliance
with section 418 [of the FD&C Act].’’ To
clearly communicate that failure to
comply with the regulations established
under section 418 of the FD&C Act is a
prohibited act, proposed § 121.401(a) in
subpart E would establish that the
operation of a facility that manufactures,
processes, packs, or holds food for sale
in the United States if the owner,
operator, or agent in charge of such
facility is required to comply with, and
is not in compliance with, section 418
or subparts C or D of part 121 is a
prohibited act under section 301(uu) of
the FD&C Act.
Section 106(d) of FSMA amends
section 301 of the FD&C Act by adding
a new section—(ww)—to the list of acts
and the causing thereof that are
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
A. Overview
FDA has examined the impacts of the
proposed rule under Executive Order
12866, Executive Order 13563, the
Regulatory Flexibility Act (5 U.S.C.
601–612), and the Unfunded Mandates
Reform Act of 1995 (Pub. L. 104–4).
Executive Orders 12866 and 13563
direct Agencies to assess all costs and
benefits of available regulatory
alternatives and, when regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety,
and other advantages; distributive
impacts; and equity). We believe that
this proposed rule is a significant
regulatory action under Executive Order
12866.
B. Regulatory Flexibility Act
The Regulatory Flexibility Act
requires Agencies to analyze regulatory
options that would minimize any
significant impact of a rule on small
entities. The annualized costs per entity
due to this proposed rule are about
$13,000 for a one-facility firm with 100
employees, and there are about 4,100
small businesses that would be affected
by the proposed rule, so we tentatively
conclude that the proposed rule could
have a significant economic impact on
a substantial number of small entities.
C. Small Business Regulatory
Enforcement Fairness Act of 1996
The Small Business Regulatory
Enforcement Fairness Act of 1996 (Pub.
L. 104–121) defines a major rule for the
purpose of congressional review as
having caused or being likely to cause
one or more of the following: An annual
effect on the economy of $100 million
or more; a major increase in costs or
prices; significant adverse effects on
competition, employment, productivity,
or innovation; or significant adverse
effects on the ability of U.S.-based
enterprises to compete with foreign-
PO 00000
Frm 00043
Fmt 4701
Sfmt 4702
78055
based enterprises in domestic or export
markets. In accordance with the Small
Business Regulatory Enforcement
Fairness Act, the Office of Management
and Budget (OMB) has determined that
this proposed rule is a major rule for the
purpose of congressional review.
D. Unfunded Mandates Reform Act of
1995
Section 202(a) of the Unfunded
Mandates Reform Act of 1995 requires
that Agencies prepare a written
statement, which includes an
assessment of anticipated costs and
benefits, before proposing ‘‘any rule that
includes any Federal mandate that may
result in the expenditure by State, local,
and tribal governments, in the aggregate,
or by the private sector, of $100,000,000
or more (adjusted annually for inflation)
in any one year.’’ The current threshold
after adjustment for inflation is $141
million, using the most current (2012)
Implicit Price Deflator for the Gross
Domestic Product. We expect this
proposed rule may result in a 1-year
expenditure that would meet or exceed
this amount.
E. Paperwork Reduction Act of 1995
This proposed rule contains
information collection requirements that
are subject to review by the Office of
Management and Budget (OMB) under
the Paperwork Reduction Act of 1995
(PRA) (44 U.S.C. 3501–3520). A
description of these provisions is given
in the Description section of this
document with an estimate of the
annual reporting, recordkeeping, and
third-party disclosure burden. Included
in the estimate is the time for reviewing
instructions, searching existing data
sources, gathering and maintaining the
data needed, and completing and
reviewing each collection of
information.
FDA invites comments on: (1)
Whether the proposed collection of
information is necessary for the proper
performance of FDA’s functions,
including whether the information will
have practical utility; (2) the accuracy of
FDA’s estimate of the burden of the
proposed collection of information,
including the validity of the
methodology and assumptions used; (3)
ways to enhance the quality, utility, and
clarity of the information to be
collected; and (4) ways to minimize the
burden of the collection of information
on respondents, including through the
use of automated collection techniques,
when appropriate, and other forms of
information technology.
To ensure that comments on
information collection are received,
OMB recommends that written
E:\FR\FM\24DEP2.SGM
24DEP2
78056
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
comments be faxed to the Office of
Information and Regulatory Affairs,
OMB, Attn: FDA Desk Officer, FAX:
202–395–7285, or emailed to oira_
submission@omb.eop.gov. All
comments should be identified with the
title ‘‘Focused Mitigation Strategies to
Protect Food Against Intentional
Adulteration.’’
In compliance with the Paperwork
Reduction Act of 1995 (44. U.S.C.
3407(d)), the agency has submitted the
information collection provisions of this
proposed rule to OMB for review.
Interested persons are requested to send
comments regarding information
collection by January 23, 2014 to the
Office of Information and Regulatory
Affairs, OMB. To ensure that comments
on information collection are received,
OMB recommends that written
comments be faxed to the Office of
Information and Regulatory Affairs,
OMB, Attn: FDA Desk Officer, FAX:
202–395–6974, or emailed to oira_
submission@omb.eop.gov. All
comments should be identified with the
title, ‘‘Focused Mitigation Strategies to
Protect Food Against Intentional
Adulteration.’’
F. Public Access to the Analyses
The analyses that we have performed
to examine the impacts of this proposed
rule under Executive Order 12866,
Executive Order 13563, the Regulatory
Flexibility Act (5 U.S.C. 601–612), the
Unfunded Mandates Reform Act of 1995
(Pub. L. 104–4), and the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501–
3520) are available to the public in the
docket for this final rule (Ref. 64).
sroberts on DSK5SPTVN1PROD with PROPOSALS
VII. Analysis of Environmental Impact
The Agency has determined under 21
CFR 25.30(h) that this action is of a type
that does not individually or
cumulatively have a significant effect on
the human environment (Ref. 65).
Therefore, neither an environmental
assessment nor an environmental
impact statement is required.
VIII. Federalism
FDA has analyzed this proposed rule
in accordance with the principles set
forth in Executive Order 13132. FDA
has determined that the proposed rule,
if finalized, would not contain policies
that would have substantial direct
effects on the States, on the relationship
between the National Government and
the States, or on the distribution of
power and responsibilities among the
various levels of government.
Accordingly, the Agency tentatively
concludes that the proposed rule does
not contain policies that have
federalism implications as defined in
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
the Executive order and, consequently,
a federalism summary impact statement
is not required.
IX. Comments
We invite public comment on the
matters specified in this document as
well as any other matters concerning
this proposed rule that are of interest.
Interested persons may submit either
electronic comments regarding this
document to https://www.regulations.gov
or written comments to the Division of
Dockets Management (see ADDRESSES). It
is only necessary to send one set of
comments. Identify comments with the
docket number found in brackets in the
heading of this document. Received
comments may be seen in the Division
of Dockets Management between 9 a.m.
and 4 p.m., Monday through Friday, and
will be posted to the docket at https://
www.regulations.gov.
X. References
The following references have been
placed on display in the Division of
Dockets Management (see ADDRESSES)
and may be seen by interested persons
between 9 a.m. and 4 p.m., Monday
through Friday. (FDA has verified the
Web site addresses, but FDA is not
responsible for any subsequent changes
to the Web sites after this document
publishes in the Federal Register.)
1. Kennedy, S.K. and F.F. Busta, ‘‘Chapter
5 Biosecurity: Food Protection and Defense,’’
Food Microbiology: Fundamentals and
Frontiers, Edited by M.P. Doyle and L.R.
Beuchat, American Society for Microbiology
Press: Washington, DC, pp. 87–102, 2007.
Accessed October 30, 2013.
2. Khan A.S., D.L. Swerdlow, and D.D.
Juranek, ‘‘Precautions Against Biological and
Chemical Terrorism Directed at Food and
Water Supplies,’’ Public Health Reports,
116(1):3–14, 2001.
3. Sobel, J., A.S. Khan, and D.L. Swerdlow,
‘‘Threat of a Biological Terrorist Attack on
the US Food Supply: The CDC Perspective,’’
The Lancet, 359(9309):874–880, March 9,
2002.
¨ ¨
4. Torok, T.J., R.V. Tauxe, R.P. Wise, et al.,
‘‘A Large Community Outbreak of
Salmonellosis Caused by Intentional
Contamination of Restaurant Salad Bars,’’
Journal of American Medical Association,
278(5):389–395, August 1997.
5. British Standards Institute and Centre
for the Protection of National Infrastructure.
‘‘Publicly Available Specification 96:2010
Defending Food and Drink,’’ March 2010.
https://www.cpni.gov.uk/documents/
publications/non-cpni_pubs/pas96_
vis14.pdf. Accessed September 25, 2013.
6. World Health Organization. ‘‘Terrorist
Threats to Food: Guidance for Establishing
and Strengthening Prevention and Response
Systems,’’ Food Safety Issues, Revision May
2008. https://www.who.int/foodsafety/
publications/general/en/terrorist.pdf.
Accessed September 23, 2013.
PO 00000
Frm 00044
Fmt 4701
Sfmt 4702
7. Everstine, K., S. Kennedy, and J. Spink,
‘‘Economically Motivated Adulteration
(EMA) of Food: Common Characteristics of
EMA Incidents,’’ Journal of Food Protection,
76(4):723–735, 2013.
8. U.S. Food and Drug Administration.
‘‘Economically Motivated Adulteration;
Public Meeting; Request for Comment,’’
Federal Register, 74(64):15497–15499, 2009.
https://www.gpo.gov/fdsys/pkg/FR-2009-0406/pdf/E9-7843.pdf. Accessed September 23,
2013.
9. Spink, J. and DC Moyer, ‘‘Defining the
Public Health Threat of Food Fraud,’’ Journal
of Food Science, 75(9):R157–R163, 2011.
10. Ingelfinger, J.R., ‘‘Melamine and the
Global Implications of Food Contamination,’’
New England Journal of Medicine,
359(26):2745–2748, 2008.
11. Xiu, C. and K.K. Klein, ‘‘Melamine in
Milk Products in China: Examining the
Factors That Led to Deliberate Use of the
Contaminant,’’ Food Policy, 35(5):463–470,
2010.
12. World Health Organization. Food
Security Page. https://www.who.int/trade/
glossary/story028/en. Accessed September
23, 2013
13. Kolavic, S., A. Kimura, S. Simons, L.
Slutsker, S. Barth, and C. Haley, ‘‘An
Outbreak of Shigella dysenteriae Type 2
Among Laboratory Workers Due to
Intentional Food Contamination,’’ Journal of
American Medical Association, 278(5):396–
398, August 1997.
14. Anderson, S., J. DeMent, C.B. Ocfemia,
and D.C. Hunt, Outbreaks of Methomyl
Poisoning Caused by the Intentional
Contamination of Salsa at the Mi Ranchito
Restaurant in Lenexa, KS—August 2009,
Kansas Department of Health and
Environment, April 12, 2011. https://
www.kdheks.gov/epi/download/Final_Mi_
Ranchito_Report.pdf. Accessed October 22,
2013.
15. U.S. Government Printing Office.
Senate Hearing 108–491, ‘‘Agroterrorism: The
Threat to America’s Breadbasket,’’ p. 1,
November 19, 2003. https://www.gpo.gov/
fdsys/pkg/CHRG-108shrg91045/html/CHRG108shrg91045.htm. Accessed September 23,
2013.
16. The White House, Office of the Press
Secretary. Homeland Security Presidential
Directive/HSPD–8, December, 17, 2003.
https://www.fas.org/irp/offdocs/nspd/hspd8.html. Accessed October 17, 2013.
17. The White House, Office of the Press
Secretary. Homeland Security Presidential
Directive 7: Critical Infrastructure
Identification, Prioritization, and Protection,
December, 17, 2003. https://www.dhs.gov/
homeland-security-presidential-directive-7.
Accessed October 17, 2013.
18. The White House, Office of the Press
Secretary. Homeland Security Presidential
Directive/HSPD–9, January, 30, 2004.
https://www.fas.org/irp/offdocs/nspd/hspd9.html. Accessed October 17, 2013.
19. The White House, Office of the Press
Secretary. Presidential Policy Directive/PPD–
8: National Preparedness, March 30, 2011.
https://www.dhs.gov/presidential-policydirective-8-national-preparedness. Accessed
October 17, 2013.
20. The White House, Office of the Press
Secretary. Presidential Policy Directive 21:
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
Critical Infrastructure Security and
Resilience, February 12, 2013. https://
www.whitehouse.gov/the-press-office/2013/
02/12/presidential-policy-directive-criticalinfrastructure-security-and-resil. Accessed
October 7, 2013.
21. U.S. Food and Drug Administration.
Strategic Partnership Program Agroterrorism
(SPPA) Initiative: Final Summary Report
September 2005—September 2008, December
2008. https://www.fda.gov/Food/
FoodDefense/FoodDefensePrograms/
ucm170509.htm. Accessed September 23,
2013.
22. U.S. Food and Drug Administration,
Center for Food Safety and Applied
Nutrition. ‘‘Guidance for Industry: Food
Producers, Processors, and Transporters:
Food Security Preventive Measures
Guidance,’’ March 2003, Revision October
2007. https://www.fda.gov/Food/
GuidanceRegulation/
GuidanceDocumentsRegulatoryInformation/
FoodDefense/ucm083075.htm. Accessed
September 23, 2013.
23. U.S. Food and Drug Administration,
Center for Food Safety and Applied
Nutrition. ‘‘Guidance for Industry: Importers
and Filers: Food Security Preventive
Measures Guidance,’’ March 2003, Revision
October 2007. https://www.fda.gov/Food/
GuidanceRegulation/
GuidanceDocumentsRegulatoryInformation/
FoodDefense/ucm078978.htm. Accessed
September 23, 2013.
24. U.S. Food and Drug Administration,
Center for Food Safety and Applied
Nutrition. ‘‘Guidance for Industry: Dairy
Farms, Bulk Milk Transporters, Bulk Milk
Transfer Stations and Fluid Milk Processors:
Food Security Preventive Measures
Guidance,’’ July 2003, Revision October
2007. https://www.fda.gov/Food/
GuidanceRegulation/
GuidanceDocumentsRegulatoryInformation/
FoodDefense/ucm078978.htm. Accessed
September 23, 2013.
25. U.S. Food and Drug Administration,
Center for Food Safety and Applied
Nutrition. ‘‘Guidance for Industry: Retail
Food Stores and Food Service
Establishments: Food Security Preventive
Measures Guidance,’’ December 2003,
Revision October 2007. https://www.fda.gov/
Food/GuidanceRegulation/
GuidanceDocumentsRegulatoryInformation/
FoodDefense/ucm082751.htm. Accessed
September 23, 2013.
26. U.S. Food and Drug Administration,
Center for Food Safety and Applied
Nutrition. ‘‘Guidance for Industry: Cosmetics
Processors and Transporters of Cosmetics
Security Preventive Measures Guidance,’’
November 2003, Revision October 2007.
https://www.fda.gov/Food/
GuidanceRegulation/
GuidanceDocumentsRegulatoryInformation/
FoodDefense/ucm082716.htm. Accessed
September 23, 2013.
27. U.S. Food and Drug Administration.
Food Defense 101 Page. https://www.fda.gov/
Food/FoodDefense/
ToolsEducationalMaterials/ucm353774.htm.
Accessed October 17, 2013.
28. U.S. Food and Drug Administration.
Employees FIRST Page. https://www.fda.gov/
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
Food/FoodDefense/
ToolsEducationalMaterials/ucm295997.htm.
Accessed and printed on October 17, 2013.
29. U.S. Food and Drug Administration.
Vulnerability Assessment Software Page,
Version 2.4, November 2011. https://
www.fda.gov/Food/FoodDefense/
ToolsEducationalMaterials/ucm295900.htm.
Accessed September 25, 2013.
30. U.S. Food and Drug Administration.
Mitigation Strategies Database Page. https://
www.fda.gov/Food/FoodDefense/
ToolsEducationalMaterials/ucm295898.htm.
Accessed September 25, 2013.
31. U.S. Food and Drug Administration.
Food Defense Plan Builder Software Page.
https://www.fda.gov/Food/FoodDefense/
ToolsEducationalMaterials/ucm349888.htm.
Accessed September 25, 2013.
32. U.S. Food and Drug Administration.
Food Related Emergency Exercise Bundle
(FREE–B) Page. https://www.fda.gov/Food/
FoodDefense/ToolsEducationalMaterials/
ucm295902.htm. Accessed October 17, 2013.
33. Global Food Safety Initiative. GFSI
Guidance Document, Version 6.1, 6(2),
August 2011. https://www.mygfsi.com/
gfsifiles/Guidance_Document_Sixth_Edition_
Version_6.1.pdf. Accessed September 23,
2013.
34. Safe Quality Food Institute. SQF Code:
A HACCP-Based Supplier Assurance Code
for the Food Industry, Edition 7.1, April
2013. https://www.sqfi.com/wp-content/
uploads/SQF-Code-Ed-7.1-4-3-13.pdf.
Accessed October 17, 2013.
35. International Featured Standards.
Events and Academy Page. https://www.ifscertification.us/events. Accessed November
5, 2013.
36. China Inspection and Quarantine
Service, Administrative Provisions on Filing
of Export Food Production Enterprises Page.
https://en.ciqcid.com/Zjl/Comprehensives/
51829.htm. Accessed September 25, 2013.
37. German Federal Office of Consumer
Protection and Food Safety. ‘‘General
Recommendations for Protection of Animal
Feed and Food Supply Chain From the
Intentional Release of Agents,’’ February
2011. Accessed October 22, 2013.
38. French Republic. Guide Containing
Recommendations for the Protection of the
Food Chain From Threats of Malevolent,
Criminal, or Terrorist Acts, May 2007.
https://www.frenchfoodintheus.org/IMG/pdf/
I07008308-imtnea-Guide_des_
recommandations-ENG_3_.pdf. Accessed and
printed on September 23, 2013.
39. Trusted Information Sharing Network
for Critical Infrastructure Protection. A
National Strategy for Enhancing the Safety
and Security of our Food Supply, March
2006. https://www.daff.gov.au/__data/assets/
pdf_file/0004/183325/enhancing_safety_
security_strategy.pdf. Accessed September
23, 2013.
40. U.S. Food and Drug Administration.
Memorandum to the File: Evaluation of the
potential for intentional adulteration of
produce during activities that occur on
produce farms, September 2013.
41. Buttars, N.K., A.J. Young, D. Bailey,
‘‘Adoption of Security Systems by Dairy
Farms To Address Bioterrorist Threats in the
Intermountain United States,’’ Journal of
PO 00000
Frm 00045
Fmt 4701
Sfmt 4702
78057
Dairy Science, 89:1822–1829, 2006. Accessed
October 22, 2013.
42. International Dairy Foods Association.
Global Markets Page. https://www.idfa.org/
key-issues/category/global-markets/map/#us.
Accessed October 23, 2013.
43. Newkirk, R., C. Hedberg, and J. Bender,
‘‘Establishing a Milkborne Disease Outbreak
Profile: Potential Food Defense
Implications,’’ Foodborne Pathogens and
Disease, 8(3):433–437, 2011.
44. Popkin, B., ‘‘Patterns of Beverage Use
Across the Lifecycle,’’ Physiology and
Behavior, 100(1):4–9, 2010.
45. Sebastian, R.S., J.D. Goldman, C.W.
Enns, and R.P. LaComb, ‘‘Fluid Milk
Consumption in the United States: What We
Eat In America, NHANES 2005–2006,’’ Food
Surveys Research Group Dietary Data Brief
No. 3, September 2010. https://ars.usda.gov/
SP2UserFiles/Place/12355000/pdf/DBrief/3_
milk_consumption_0506.pdf. Accessed
October 23, 2013.
46. U.S. Department of Agriculture and
Economic Research Service. Dairy Products:
Per capita consumption, United States
(Annual), 2013. https://www.ers.usda.gov/
data-products/dairy-data.aspx. Accessed
October 23, 2013.
47. Wein, L.M. and Y. Lui, ‘‘Analyzing a
Bioterror Attack on the Food Supply: The
Case of Botulinum Toxin in Milk,’’
Proceedings of the National Academy of
Sciences of the United States of America,
102(28):9984–9989, 2005.
48. Blayney, D.P., ‘‘The Changing
Landscape of U.S. Milk Production,’’
Statistical Bulletin No. 978, U.S. Department
of Agriculture, June 2002. https://
usda.mannlib.cornell.edu/usda/nass/sb/
sb978.pdf. Accessed October 23, 2013.
49. Codex Alimentarius Commission.
General Principles of Food Hygiene, CAC/
RCP 1–1969, 2003.
50. Sobel J. and J. Watson, ‘‘Chapter 10:
Intentional Terrorism Contamination of Food
and Water,’’ Beyond Anthrax, Springer Link,
2009.
51. Stinson, T.F., J. Kinsey, D. Degeneffe,
and K. Ghosh, How Should America’s AntiTerrorism Budget Be Allocated? Findings
From a National Survey of Attitudes of U.S.
Residents About Terrorism, The Food
Industry Center, March 2006. https://
ageconsearch.umn.edu/bitstream/14351/1/
tr06–01.pdf. Accessed October 21, 2013.
52. Merriam-Webster. Vulnerability Page.
https://www.merriam-webster.com/dictionary/
vulnerability. Accessed October 21, 2013.
53. U.S. Food and Drug Administration,
Study and Report on the Food Processing
Sector, 2011.
54. U.S. Food and Drug Administration.
Analysis of Results for FDA Food Defense
Vulnerability Assessments and Identification
of Activity Types, April 2013. https://
www.fda.gov/food/guidanceregulation/fsma/
ucm347023.htm. Accessed September 25,
2013.
55. U.S. Food and Drug Administration.
Memorandum to the File: Evaluation of the
potential for intentional adulteration of
animal feed from acts of terrorism, December
2013.
56. U.S. Department of Health and Human
Services, Public Health Service, and National
E:\FR\FM\24DEP2.SGM
24DEP2
78058
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
sroberts on DSK5SPTVN1PROD with PROPOSALS
Toxicology Program. Report on Carcinogens,
12th Edition, 2011.
57. U.S. Department of Health and Human
Services, Centers for Disease Control and
Prevention, and U.S. Department of
Agriculture. HHS and USDA Select Agents
and Toxins 7 CFR Part 331, 9 CFR Part 121,
and 42 CFR Part 73, September 10, 2013.
https://www.selectagents.gov/resources/
List_of_Select_Agents_and_Toxins_2013-0910.pdf. Accessed October 21, 2013.
58. U.S. Food and Drug Administration.
Vulnerability Assessments of Food Systems:
Final Summary Report, June 2009-February
2012. https://www.fda.gov/downloads/Food/
FoodDefense/UCM317547.pdf. Accessed
September 23, 2013.
59. AIB International. Food Safety and
Food Defense Education Page. https://
www.aibonline.org/foodsafetyeducation/
index.html. Accessed October 17, 2013.
60. Center for Agriculture and Food
Security and Preparedness and University of
Tennessee Knoxville. Instructor-Led Courses
Page: Agriculture and Food Vulnerability
Assessment Training. https://
www.vet.utk.edu/cafsp/courses.php.
Accessed October 17, 2013.
61. International Featured Standards. IFS
Food: Standard for Auditing Quality and
Food Safety of Food Products, Version 6,
January 2012. https://www.ifscertification.com/images/ifs_standards/ifs6/
IFS_Food_V6_en.pdf. Accessed September
23, 2013.
62. National Center for Food Protection
and Defense. Food Defense Online Modules
Page. https://www.ncfpd.umn.edu/index.cfm/
education/food-defense-online-modules/.
Accessed October 17, 2013.
63. AIB International. The AIB
International Consolidated Standards for
Inspection: Prerequisite and Food Safety
Programs, January 2013. https://
www.aibonline.org/Standards/
2013FoodSafety_web_ENG.pdf. Accessed
October 17, 2013.
64. U.S. Food and Drug Administration.
FDA’s Preliminary Regulatory Impact
Analysis, Preliminary Regulatory Flexibility
Analysis, Preliminary Unfunded Mandates
Reform Act Analysis, Preliminary Paperwork
Reduction Act Analysis, December 2013.
65. U.S. Food and Drug Administration.
Memorandum to the File: Environmental
analysis related to the proposed rule on
focused mitigation strategies to protect food
against intentional adulteration, November
2013.
List of Subjects in 21 CFR Part 121
Food packaging, Foods.
Therefore, under the Federal Food,
Drug, and Cosmetic Act and under
authority delegated to the Commissioner
of Food and Drugs, it is proposed that
21 CFR chapter I be amended by adding
part 121 to read as follows:
PART 121—FOCUSED MITIGATION
STRATEGIES TO PROTECT FOOD
AGAINST INTENTIONAL
ADULTERATION
Subpart A—General Provisions
Sec.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
121.3
121.5
Definitions.
Exemptions.
Subpart B—[Reserved]
Subpart C—Food Defense Measures
121.126 Requirement for a food defense
plan.
121.130 Identification of actionable process
steps.
121.135 Focused mitigation strategies for
actionable process steps.
121.140 Monitoring.
121.145 Corrective actions.
121.150 Verification.
121.160 Training.
Subpart D—Requirements Applying to
Records That Must Be Established and
Maintained
121.301 Records subject to the requirements
of this subpart.
121.305 General requirements applying to
records.
121.310 Additional requirements applying
to the food defense plan.
121.315 Requirements for record retention.
121.320 Requirements for official review.
121.325 Public disclosure.
Subpart E—Compliance
121.401 Compliance.
Authority: 21 U.S.C. 331, 342, 350g,
350(i), 371, 374.
Subpart A—General Provisions
§ 121.3
Definitions.
The definitions and interpretations of
terms in section 201 of the Federal
Food, Drug, and Cosmetic Act are
applicable to such terms when used in
this part. The following definitions also
apply:
Actionable process step means a
point, step, or procedure in a food
process at which food defense measures
can be applied and are essential to
prevent or eliminate a significant
vulnerability or reduce such
vulnerability to an acceptable level.
Contaminant means any biological,
chemical, physical or radiological agent
that may be intentionally added to food
and that may cause illness, injury or
death.
Facility means a domestic facility or
a foreign facility that is required to
register under section 415 of the Federal
Food, Drug, and Cosmetic Act (21 U.S.C.
350d), in accordance with the
requirements of 21 CFR part 1, subpart
H.
Farm means farm as defined in
§ 1.227 of this chapter.
FDA means the Food and Drug
Administration.
Focused mitigation strategies mean
those risk-based, reasonably appropriate
measures that a person knowledgeable
about food defense would employ to
significantly minimize or prevent
significant vulnerabilities identified at
PO 00000
Frm 00046
Fmt 4701
Sfmt 4702
actionable process steps, and that are
consistent with the current scientific
understanding of food defense at the
time of the analysis.
Food means food as defined in section
201(f) of the Federal Food, Drug, and
Cosmetic Act (21 U.S.C. 321(f)) and
includes raw materials and ingredients.
Food defense means the effort to
protect food from intentional acts of
adulteration where there is an intent to
cause public health harm and economic
disruption.
Holding means storage of food.
Holding facilities include warehouses,
cold storage facilities, storage silos,
grain elevators, and liquid storage tanks.
For farms and farm mixed-type
facilities, holding also includes
activities traditionally performed by
farms for the safe or effective storage of
raw agricultural commodities grown or
raised on the same farm or another farm
under the same ownership, but does not
include activities that transform a raw
agricultural commodity, as defined in
section 201(r) of the Federal Food, Drug,
and Cosmetic Act, into a processed food
as defined in section 201(gg).
Manufacturing/processing means
making food from one or more
ingredients, or synthesizing, preparing,
treating, modifying or manipulating
food, including food crops or
ingredients. Examples of
manufacturing/processing activities are
cutting, peeling, trimming, washing,
waxing, eviscerating, rendering,
cooking, baking, freezing, cooling,
pasteurizing, homogenizing, mixing,
formulating, bottling, milling, grinding,
extracting juice, distilling, labeling, or
packaging. For farms and farm mixedtype facilities, manufacturing/
processing does not include activities
that are part of harvesting, packing, or
holding.
Mixed-type facility means an
establishment that engages in both
activities that are exempt from
registration under section 415 of the
Federal Food, Drug, and Cosmetic Act
and activities that require the
establishment to be registered. An
example of such a facility is a ‘‘farm
mixed-type facility,’’ which is an
establishment that grows and harvests
crops or raises animals and may
conduct other activities within the farm
definition, but also conducts activities
that require the establishment to be
registered.
Monitor means to conduct a planned
sequence of observations or
measurements to assess whether
focused mitigation strategies are
consistently applied and to produce an
accurate record for use in verification.
E:\FR\FM\24DEP2.SGM
24DEP2
sroberts on DSK5SPTVN1PROD with PROPOSALS
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
Packing means placing food into a
container other than packaging the food.
For farms and farm mixed-type
facilities, packing also includes
activities traditionally performed by
farms to prepare raw agricultural
commodities grown or raised on the
same farm or another farm under the
same ownership for storage and
transport, but does not include activities
that transform a raw agricultural
commodity, as defined in section 201(r)
of the Federal Food, Drug, and Cosmetic
Act, into a processed food as defined in
section 201(gg).
Qualified end-user, with respect to a
food, means the consumer of the food
(where the term consumer does not
include a business); or a restaurant or
retail food establishment (as those terms
are defined in § 1.227 of this chapter)
that:
(1) Is located:
(i) In the same State as the qualified
facility that sold the food to such
restaurant or establishment; or
(ii) Not more than 275 miles from
such facility; and
(2) Is purchasing the food for sale
directly to consumers at such restaurant
or retail food establishment.
Qualified facility means (when
including the sales by any subsidiary;
affiliate; or subsidiaries or affiliates,
collectively, of any entity of which the
facility is a subsidiary or affiliate) a
facility that is:
(1) A very small business as defined
in this part; or
(2) A facility to which both of the
following apply:
(i) During the 3-year period preceding
the applicable calendar year, the average
annual monetary value of the food
manufactured, processed, packed or
held at such facility that is sold directly
to qualified end-users (as defined in this
part) during such period exceeded the
average annual monetary value of the
food sold by such facility to all other
purchasers; and
(ii) The average annual monetary
value of all food sold during the 3-year
period preceding the applicable
calendar year was less than $500,000,
adjusted for inflation.
Significant vulnerability means a
vulnerability for which a prudent
person knowledgeable about food
defense would employ food defense
measures because of the potential for
serious adverse health consequences or
death and the degree of accessibility to
that point in the food process.
Significantly minimize means to
reduce to an acceptable level, including
to eliminate.
Small business means a business
employing fewer than 500 persons.
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
78059
Verification means those activities,
other than monitoring, that establish
that the system is operating according to
the food defense plan.
Very small business means a business
that has less than $10,000,000 in total
annual sales of food, adjusted for
inflation.
Vulnerability means the susceptibility
of a point, step, or procedure in a
facility’s food process to intentional
adulteration.
(ii) Constitutes not more than 5
percent of the overall sales of the
facility, as determined by the Secretary
of the Treasury.
(f) This part does not apply to the
manufacturing, processing, packing, or
holding of food for animals other than
man.
§ 121.5
§ 121.126
plan.
Exemptions.
(a) This part does not apply to a
qualified facility, except that qualified
facilities must, upon request, provide
for official review documentation that
was relied upon to demonstrate that the
facility meets this exemption. Such
documentation must be retained for 2
years.
(b) This part does not apply to the
holding of food, except the holding of
food in liquid storage tanks.
(c) This part does not apply to the
packing, re-packing, labeling, or relabeling of food where the container that
directly contacts the food remains
intact.
(d) This part does not apply to
activities of a facility that are subject to
section 419 of the Federal Food, Drug,
and Cosmetic Act (21 U.S.C. 350h)
(Standards for Produce Safety).
(e)(1) This part does not apply with
respect to alcoholic beverages at a
facility that meets the following two
conditions:
(i) Under the Federal Alcohol
Administration Act (27 U.S.C. 201 et
seq.) or chapter 51 of subtitle E of the
Internal Revenue Code of 1986 (26
U.S.C. 5001 et seq.) the facility is
required to obtain a permit from,
register with, or obtain approval of a
notice or application from the Secretary
of the Treasury as a condition of doing
business in the United States, or is a
foreign facility of a type that would
require such a permit, registration, or
approval if it were a domestic facility;
and
(ii) Under section 415 of the Federal
Food, Drug, and Cosmetic Act (21 U.S.C.
350d) the facility is required to register
as a facility because it is engaged in
manufacturing, processing, packing, or
holding one or more alcoholic
beverages.
(2) This part does not apply with
respect to food other than alcoholic
beverages at a facility described in
paragraph (e)(1) of this section,
provided such food:
(i) Is in prepackaged form that
prevents any direct human contact with
such food; and
PO 00000
Frm 00047
Fmt 4701
Sfmt 4702
Subpart B—[Reserved]
Subpart C—Food Defense Measures
Requirement for a food defense
(a) Food defense plan. The owner,
operator, or agent in charge of a facility
must prepare, or have prepared, and
implement a written food defense plan.
(b) Contents of a food defense plan.
The food defense plan must include:
(1) The written identification of
actionable process steps as required by
§ 121.130;
(2) The written focused mitigation
strategies as required by § 121.135(b);
(3) The written procedures for
monitoring as required by § 121.140(a);
(4) The written corrective action
procedures as required by
§ 121.145(a)(1); and
(5) The written verification
procedures as required by § 121.150(e).
§ 121.130 Identification of actionable
process steps.
The owner, operator, or agent in
charge of a facility must identify any
actionable process steps, using the
procedures described in either
paragraph (a) or paragraph (b) of this
section. The identification of actionable
process steps and the assessment
leading to that identification must be
written.
(a) Key activity types. The owner,
operator, or agent in charge of a facility
must assess, for each type of food
manufactured, processed, packed or
held at the facility, whether the facility
has one or more of the following key
activity types and identify the
actionable process steps associated with
any key activity types present:
(1) Bulk liquid receiving and
loading—a step in which a bulk liquid
is received and unloaded from an
inbound conveyance or loaded into an
outbound conveyance where a
contaminant can be intentionally
introduced and, if it is, it is likely that
the contaminant will be distributed
throughout the liquid due to sloshing,
movement, or turbulence caused by the
receiving and unloading or loading
activity.
(2) Liquid storage and handling—a
step in which a liquid is contained in
bulk storage tanks or in holding, surge,
E:\FR\FM\24DEP2.SGM
24DEP2
78060
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
or metering tanks where a contaminant
can be intentionally introduced and, if
it is, it is likely that the contaminant
will be distributed into the food.
(3) Secondary ingredient handling—a
staging, preparation, addition, or rework
step where a contaminant can be
intentionally introduced into a
relatively small amount of ingredient or
rework and, if it is, it is likely that the
contaminant will be distributed into a
larger volume of food.
(4) Mixing and similar activities—a
step, such as mixing, blending,
homogenizing, or grinding where a
contaminant can be intentionally
introduced and, if it is, it is likely that
the contaminant will be distributed into
the food.
(b) Vulnerability assessment. The
owner, operator, or agent in charge of a
facility must conduct or have
conducted, for each type of food
manufactured, processed, packed or
held at the facility, an evaluation to
identify and prioritize the points, steps,
and procedures in a food operation
based on their vulnerability to
intentional adulteration and to identify
actionable process steps. Such
vulnerability assessments must be
performed by an individual(s) qualified
by experience and/or training using
appropriate methods.
sroberts on DSK5SPTVN1PROD with PROPOSALS
(a) The owner, operator, or agent in
charge of a facility must identify and
implement focused mitigation strategies
at each actionable process step to
provide assurances that the significant
vulnerability at each step will be
significantly minimized or prevented
and the food manufactured, processed,
packed, or held by such facility will not
be adulterated under section 402 of the
Federal Food, Drug, and Cosmetic Act
(21 U.S.C. 342).
(b) Focused mitigation strategies must
be written.
(c) Focused mitigation strategies
required under this section are subject
to:
(1) Monitoring as required by
§ 121.140;
(2) Corrective actions as required by
§ 121.145; and
(3) Verification as required by
§ 121.150.
Monitoring.
(a) The owner, operator, or agent in
charge of a facility must establish and
implement written procedures,
including the frequency with which
they are to be performed, for monitoring
the focused mitigation strategies.
(b) The owner, operator, or agent in
charge of a facility must monitor the
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
§ 121.145
Corrective actions.
(a) Corrective action procedures. (1)
The owner, operator, or agent in charge
of a facility must establish and
implement written corrective action
procedures that must be taken if focused
mitigation strategies are not properly
implemented.
(2) The corrective action procedures
must describe the steps to be taken to
ensure that appropriate action is taken
to identify and correct a problem with
implementation of a focused mitigation
strategy to reduce the likelihood that the
problem will recur.
(b) Documentation. All corrective
actions taken in accordance with this
section must be documented in records
that are subject to verification in
accordance with § 121.150(b) and
records review in accordance with
§ 121.150(c).
§ 121.150
§ 121.135 Focused mitigation strategies
for actionable process steps.
§ 121.140
focused mitigation strategies with
sufficient frequency to provide
assurances that they are consistently
applied.
(c) All monitoring of focused
mitigation strategies in accordance with
this section must be documented in
records that are subject to verification in
accordance with § 121.150(a) and
records review in accordance with
§ 121.150(c).
Verification.
(a) Monitoring. The owner, operator,
or agent in charge of a facility must
verify that monitoring is being
conducted, as required by § 121.140.
(b) Corrective actions. The owner,
operator, or agent in charge of a facility
must verify that appropriate decisions
about corrective actions are being made,
as required by § 121.145.
(c) Implementation and effectiveness.
The owner, operator, or agent in charge
of a facility must verify that the focused
mitigation strategies are consistently
implemented and are effectively and
significantly minimizing or preventing
the significant vulnerabilities. As
appropriate to the facility and the food,
this must include review of the
monitoring and corrective actions
records within appropriate timeframes
to ensure that the records are complete,
the activities reflected in the records
occurred in accordance with the food
defense plan, the focused mitigation
strategies are effective, and appropriate
decisions were made about corrective
actions.
(d) Reanalysis. The owner, operator,
or agent in charge of a facility must:
(1) Conduct a reanalysis of the food
defense plan:
(i) At least once every 3 years;
(ii) Whenever a significant change is
made in the activities conducted at a
PO 00000
Frm 00048
Fmt 4701
Sfmt 4702
facility operated by such owner,
operator, or agent in charge if the
change creates a reasonable potential for
a new vulnerability or a significant
increase in a previously identified
vulnerability;
(iii) Whenever such owner, operator
or agent in charge becomes aware of
new information about potential
vulnerabilities associated with the food
operation or facility;
(iv) Whenever a focused mitigation
strategy is found to be ineffective; and
(v) Whenever FDA requires reanalysis
to respond to new vulnerabilities and
developments in scientific
understanding including, as
appropriate, results from the
Department of Homeland Security
biological, chemical, radiological, or
other terrorism risk assessment.
(2) Complete such reanalysis and
implement any additional focused
mitigation strategies needed to address
the significant vulnerabilities identified,
if any, before the change in activities at
the facility is operative or, when
necessary, during the first 6 weeks of
production; and
(3) Revise the written plan if a
significant change is made or document
the basis for the conclusion that no
additional or revised focused mitigation
strategies are needed.
(e) Documentation. All verification
activities taken in accordance with this
section must be documented in records.
§ 121.160
Training.
(a) Personnel and supervisors
assigned to actionable process steps
must receive appropriate training in
food defense awareness and their
respective responsibilities in
implementing focused mitigation
strategies.
(b) All training received in accordance
with this section must be documented
in records.
Subpart D—Requirements Applying to
Records That Must Be Established and
Maintained
§ 121.301 Records subject to the
requirements of this subpart D.
(a) Except as provided by paragraph
(b) of this section, all records required
by subpart C of this part are subject to
all requirements of this subpart D.
(b) The requirements of § 121.310
apply only to the written food defense
plan.
§ 121.305 General requirements applying
to records.
Records must:
(a) Be kept as original records, true
copies (such as photocopies, pictures,
scanned copies, microfilm, microfiche,
E:\FR\FM\24DEP2.SGM
24DEP2
Federal Register / Vol. 78, No. 247 / Tuesday, December 24, 2013 / Proposed Rules
or other accurate reproductions of the
original records), or electronic records,
which must be kept in accordance with
part 11 of this chapter;
(b) Contain the actual values and
observations obtained during
monitoring;
(c) Be accurate, indelible, and legible;
(d) Be created concurrently with
performance of the activity documented;
(e) Be as detailed as necessary to
provide history of work performed; and
(f) Include:
(1) The name and location of the
facility;
(2) The date and time of the activity
documented;
(3) The signature or initials of the
person performing the activity; and
(4) Where appropriate, the identity of
the product and the production code, if
any.
least 2 years after the date they were
prepared.
(b) The food defense plan must be
retained for at least 2 years after its use
is discontinued;
(c) Except for the food defense plan,
offsite storage of records is permitted
after 6 months following the date that
the record was made if such records can
be retrieved and provided onsite within
24 hours of request for official review.
The food defense plan must remain
onsite. Electronic records are considered
to be onsite if they are accessible from
an onsite location.
(d) If the facility is closed for a
prolonged period, the records may be
transferred to some other reasonably
accessible location but must be returned
to the facility within 24 hours for
official review upon request.
§ 121.310 Additional requirements
applying to the food defense plan.
§ 121.320
The food defense plan must be signed
and dated by the owner, operator, or
agent in charge of the facility:
(a) Upon initial completion; and
(b) Upon any modification.
§ 121.315 Requirements for record
retention.
sroberts on DSK5SPTVN1PROD with PROPOSALS
(a) All records required by this part
must be retained at the facility for at
VerDate Mar<15>2010
17:30 Dec 23, 2013
Jkt 232001
Requirements for official review.
All records required by this part must
be made promptly available to a duly
authorized representative of the
Secretary of Health and Human Services
upon oral or written request.
§ 121.325
Public disclosure.
Subpart E—Compliance
§ 121.401
Compliance.
(a) The operation of a facility that
manufactures, processes, packs, or holds
food for sale in the United States if the
owner, operator, or agent in charge of
such facility is required to comply with,
and is not in compliance with, section
418 of the Federal Food, Drug, and
Cosmetic Act (21 U.S.C. 350g) or
subparts C or D of this part is a
prohibited act under section 301(uu) of
the Federal Food, Drug, and Cosmetic
Act (21 U.S.C. 331(uu)).
(b) The failure to comply with section
420 of the Federal Food, Drug, and
Cosmetic Act (21 U.S.C. 350i) or
subparts C or D of this part is a
prohibited act under section 301(ww) of
the Federal Food, Drug, and Cosmetic
Act.
Dated: December 13, 2013.
Leslie Kux,
Assistant Commissioner for Policy.
[FR Doc. 2013–30373 Filed 12–20–13; 8:45 am]
BILLING CODE 4160–01–P
Records required by this part will be
protected from public disclosure to the
extent allowable under part 20 of this
chapter.
PO 00000
Frm 00049
Fmt 4701
Sfmt 9990
78061
E:\FR\FM\24DEP2.SGM
24DEP2
Agencies
[Federal Register Volume 78, Number 247 (Tuesday, December 24, 2013)]
[Proposed Rules]
[Pages 78013-78061]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-30373]
[[Page 78013]]
Vol. 78
Tuesday,
No. 247
December 24, 2013
Part III
Department of Health and Human Services
-----------------------------------------------------------------------
Food and Drug Administration
-----------------------------------------------------------------------
21 CFR Parts 16 and 121
Focused Mitigation Strategies To Protect Food Against Intentional
Adulteration; Proposed Rule
Federal Register / Vol. 78 , No. 247 / Tuesday, December 24, 2013 /
Proposed Rules
[[Page 78014]]
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Food and Drug Administration
21 CFR Parts 16 and 121
[Docket No. FDA-2013-N-1425]
RIN 0910-AG63
Focused Mitigation Strategies To Protect Food Against Intentional
Adulteration
AGENCY: Food and Drug Administration, HHS.
ACTION: Proposed rule.
-----------------------------------------------------------------------
SUMMARY: The Food and Drug Administration (FDA or we) is proposing to
require domestic and foreign food facilities that are required to
register under the Federal Food, Drug, and Cosmetic Act (the FD&C Act)
to address hazards that may be intentionally introduced by acts of
terrorism. These food facilities would be required to identify and
implement focused mitigation strategies to significantly minimize or
prevent significant vulnerabilities identified at actionable process
steps in a food operation. FDA is proposing these requirements as part
of our implementation of the FDA Food Safety Modernization Act (FSMA).
Further, as part of the proposal, FDA discusses an approach to
addressing economically motivated intentional adulteration. We expect
the proposed rule, if finalized as proposed, would help to protect food
from intentional adulteration caused by acts of terrorism.
DATES: Submit either electronic or written comments on the proposed
rule by March 31, 2014. Submit comments on information collection
issues under the Paperwork Reduction Act of 1995 by January 23, 2014,
(see the ``Paperwork Reduction Act of 1995'' section of this document).
ADDRESSES: You may submit comments, identified by Docket No. FDA-2013-
N-1425 and/or Regulatory Information Number (RIN) 0910-AG63, by any of
the following methods, except that comments on information collection
issues under the Paperwork Reduction Act of 1995 must be submitted to
the Office of Information and Regulatory Affairs, Office of Management
and Budget (OMB) (see the ``Paperwork Reduction Act of 1995'' section
of this document).
Electronic Submissions
Submit electronic comments in the following way:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Written Submissions
Submit written submissions in the following ways:
Mail/Hand delivery/Courier (for paper or CD-ROM
submissions): Division of Dockets Management (HFA-305), Food and Drug
Administration, 5630 Fishers Lane, rm. 1061, Rockville, MD 20852.
Instructions: All submissions received must include the Agency name
and Docket No. FDA-2013-N-1425 and Regulatory Information Number (RIN)
0910-AG63 for this rulemaking. All comments received may be posted
without change to https://www.regulations.gov, including any personal
information provided. For additional information on submitting
comments, see the ``Comments'' heading of the SUPPLEMENTARY INFORMATION
section of this document.
Docket: For access to the docket to read background documents or
comments received, go to https://www.regulations.gov and insert the
docket number, found in brackets in the heading of this document, into
the ``Search'' box and follow the prompts and/or go to the Division of
Dockets Management, 5630 Fishers Lane, rm. 1061, Rockville, MD 20852.
FOR FURTHER INFORMATION CONTACT: Regarding the provisions with respect
to human food: Ryan Newkirk, Center for Food Safety and Applied
Nutrition (HFS-005), Food and Drug Administration, 5100 Paint Branch
Pkwy., College Park, MD 20740, 240-402-2428. Regarding the provisions
with respect to food for animals: Alfred Montgomery, Center for
Veterinary Medicine (HFV-200), Food and Drug Administration, 7519
Standish Pl., Rockville, MD 20855, 240-453-6836.
SUPPLEMENTARY INFORMATION:
Table of Contents
Executive Summary
Scope of Coverage of the Proposed Rule
Summary of the Major Provisions of the Proposed Rule
Costs and Benefits
I. Introduction
II. Background
A. Incidents of Intentional Adulteration of Food
B. Interagency Approach to Food Defense
C. Resources for the Food Sector
D. Outreach
E. Industry Standards
F. International Food Defense Guidelines
III. Legal Authority
A. Section 103 of FSMA
B. Section 106 of FSMA
C. Intrastate Activities
IV. Regulatory Approach
A. Framework of the Rule
B. Activities That Occur on Produce Farms
C. Transportation Carriers
D. Food for Animals
E. Acts of Disgruntled Employees, Consumers, or Competitors
F. Economically Motivated Adulteration
G. Low-Risk Activities at Farm Mixed-Type Facilities
H. Activities That Occur on Dairy Farms
I. Other Ways To Focus on Foods With a High Risk of Intentional
Adulteration Caused by Terrorism
V. The Proposal
A. Definitions
B. Exemptions
C. Food Defense Measures
D. Requirements Applying to Records That Must Be Established and
Maintained
E. Compliance
VI. Preliminary Regulatory Impact Analysis
VII. Analysis of Environmental Impact
VIII. Federalism
IX. Comments
X. References
Executive Summary
This proposed regulation implements three provisions of the Federal
Food, Drug, and Cosmetic (FD&C) Act, as amended by the FDA Food Safety
Modernization Act (FSMA), that relate to the intentional adulteration
of food. Section 418 of the FD&C Act (21 U.S.C. 350g) addresses
intentional adulteration in the context of facilities that manufacture,
process, pack, or hold food and are required to register under section
415 of the FD&C Act (21 U.S.C. 350d). Section 419 of the FD&C Act (21
U.S.C. 350h) addresses intentional adulteration in the context of
fruits and vegetables that are raw agricultural commodities. Section
420 of the FD&C Act (21 U.S.C. 350i) addresses intentional adulteration
in the context of high risk foods and exempts farms except for farms
that produce milk. FDA is implementing the intentional adulteration
provisions in sections 418, 419, and 420 of the FD&C Act in this
rulemaking.
Scope of Coverage of the Proposed Rule
The subject of this proposed rule is protection of food against
intentional adulteration caused by acts of terrorism. This proposed
rule would apply to both domestic and foreign facilities that are
required to register under section 415 of the FD&C Act. However, as
explained in the remainder of this document and shown in Diagram 1 and
Table 1, the proposed rule contains several exemptions. (The diagrams
and table below are intended to illustrate the proposed scope and
requirements of this rule, and do not include all aspects of the
proposed regulation.) These exemptions are:
The proposed rule would not apply to a qualified facility,
except that the
[[Page 78015]]
facility would be required to provide for official review, upon
request, documentation that was relied upon to demonstrate that the
facility qualifies for this exemption. As proposed, a qualified
facility would be: (1) A very small business (i.e., a business that has
less than $10,000,000 in total annual sales of food, adjusted for
inflation), or (2) a facility that meets two requirements, i.e., (a)
During the 3-year period preceding the applicable calendar year, the
average annual monetary value of the food manufactured, processed,
packed or held at such facility that is sold directly to qualified end-
users (as defined in this part) during such period exceeded the average
annual monetary value of the food sold by such facility to all other
purchasers; and (b) the average annual monetary value of all food sold
during the 3-year period preceding the applicable calendar year was
less than $500,000, adjusted for inflation.
This proposed rule would not apply to the holding of food,
except the holding of food in liquid storage tanks.
This proposed rule would not apply to the packing, re-
packing, labeling, or re-labeling of food where the container that
directly contacts the food remains intact.
This proposed rule would not apply to activities of a
facility that are subject to section 419 of the Federal Food, Drug, and
Cosmetic Act (Standards for Produce Safety).
This proposed rule would not apply with respect to
alcoholic beverages at a facility that meets certain conditions.
This proposed rule would not apply to the manufacturing,
processing, packing, or holding of food for animals other than man.
We seek comment on these exclusions and whether additional
exclusions are warranted.
BILLING CODE 4160-01-P
[[Page 78016]]
[GRAPHIC] [TIFF OMITTED] TP24DE13.026
BILLING CODE 4160-01-C
[[Page 78017]]
Table 1--Scope of Intentional Adulteration and Proposed Exclusions and
Exemptions
------------------------------------------------------------------------
Brief rationale, and
Coverage within relevant
Type of intentional scope of proposed 21 corresponding
adulteration CFR 121 section of the rule
*
------------------------------------------------------------------------
I. Types of Intentional Adulteration Considered in this Proposed
Rulemaking
------------------------------------------------------------------------
1. Acts of disgruntled Not within the scope [ssquf] Not
employees, consumers, or of intentional considered ``high
competitors intended to adulteration risk'' because not
attack the reputation of a covered under intended to cause
company, and not to cause proposed 21 CFR 121. widespread,
public health harm, significant public
although public health harm health harm.
may occur. [ssquf] See section
IV.E of this
document.
2. Economically motivated Not within the scope [ssquf] Considering
adulteration (EMA) intended of intentional addressing as part
to obtain economic gain, adulteration of hazard analysis
and not to cause public covered under in a preventive
health harm, although proposed 21 CFR 121. controls framework
public health harm may where EMA is
occur. ``reasonably likely
to occur.''
[ssquf] See section
IV.F of this
document.
3. Acts intended to cause Covered within [ssquf] Considered
massive public health harm, scope, and is the ``high risk''
including acts of terrorism. focus of proposed because intent of
21 CFR 121. the act is to cause
widespread,
significant public
health harm.
[ssquf] See section
IV.A of this
document.
------------------------------------------------------------------------
II. Facilities or Operations Excluded or Exempted from Proposed 21 CFR
121
------------------------------------------------------------------------
Facility or Operation Exclusion or Brief rationale, and
Exemption (and any relevant
associated modified corresponding
requirements) section of the rule
*
------------------------------------------------------------------------
Activities that fall within Excluded............ [ssquf] Activities
the definition of ``farm'' that occur on
(as defined in 21 CFR Sec. produce farms are
1.227). not considered
``high risk.''
[ssquf] Activities
that occur on dairy
farms are addressed
below.
[ssquf] Activities
that occur on other
farms are outside
the scope of 103,
105, and 106 of
FSMA.
[ssquf] See section
IV.B of this
document.
Transportation carriers..... Excluded............ [ssquf]
Transportation of
bulk liquids is
addressed by
coverage of
shippers and
receivers.
[ssquf] Other
transportation
activities are not
considered ``high
risk.''
[ssquf] See section
IV.C of this
document.
------------------------------------------------------------------------
Activities that occur on [ssquf] Fluid milk storage and loading
dairy farms. appear to pose a significant
vulnerability.
[ssquf] We seek comment on practical and
effective approach to address this
vulnerability.
[ssquf] See section IV.H of this document.
------------------------------------------------------------------------
Qualified facility, as Exempt, except must [ssquf] Very small
defined in proposed Sec. provide for FDA businesses are not
121.3. review, upon considered ``high
request, risk.''
documentation [ssquf] See section
relied on to V.B.1 of this
demonstrate that document.
the facility
qualifies for this
exemption.
Holding of food, except the Exempt.............. [ssquf] Not
holding of food in liquid considered ``high
storage tanks. risk'' because
these activities do
not fit within any
of the FDA-
identified key
activity types.
[ssquf] See section
V.B.2 of this
document.
------------------------------------------------------------------------
Packing, re-packing, Exempt.............. [ssquf] Not
labeling, or re-labeling of considered ``high
food where the container risk'' because
that directly contacts the these activities do
food remains intact. not fit within any
of the FDA-
identified key
activity types.
[ssquf] See section
V.B.3 of this
document.
Activities of a facility Exempt.............. [ssquf] Activities
that are subject to that occur on
Standards for Produce produce farms are
Safety (proposed 21 CFR not considered
112). ``high risk.''
[ssquf] See section
V.B.4 of this
document.
Alcoholic beverages at Exempt.............. [ssquf] Alcoholic
certain alcohol-related beverages at these
facilities, and certain facilities are
prepackaged food sold in outside the scope
limited quantities along of 103, 105, and
with alcoholic beverages at 106 of FSMA.
the same facilities (see [ssquf] See section
proposed Sec. 121.5(e)). V.B.5 of this
document.
Manufacturing, processing, Exempt.............. [ssquf] Not
packing, or holding of food considered ``high
for animals. risk'' because
unlikely to impact
human health.
[ssquf] See section
V.B.6 of this
document.
------------------------------------------------------------------------
* Please see the corresponding sections of the rule identified in the
column for a complete discussion of our analysis, rationale, and
tentative conclusions related to the proposed exclusions or exemption.
[[Page 78018]]
Summary of the Major Provisions of the Proposed Rule
This proposed rule would establish various food defense measures
that an owner, operator, or agent in charge of a facility would be
required to implement to protect against the intentional adulteration
of food, as summarized in Diagram 2. Specifically:
Prepare and implement a written food defense plan that
includes actionable process steps, focused mitigation strategies, and
procedures for monitoring, corrective actions, and verification
(proposed Sec. 121.126).
Identify any actionable process steps, using one of two
procedures. FDA has analyzed vulnerability assessments conducted using
the CARVER+Shock methodology and identified four key activity types:
Bulk liquid receiving and loading; Liquid storage and handling;
Secondary ingredient handling; and Mixing and similar activities. FDA
has determined that the presence of one or more of these key activity
types at a process step (e.g., manufacturing, processing, packing, or
holding of food) indicates a significant vulnerability under section
418 of the FD&C Act and that the food is at high risk of intentional
adulteration caused by acts of terrorism under section 420 of the FD&C
Act. Facilities may identify actionable process steps using the FDA-
identified key activity types as described in proposed Sec. 121.130(a)
or conduct their own facility-specific vulnerability assessments as
provided in proposed Sec. 121.130(b).
Identify and implement focused mitigation strategies at
each actionable process step to provide assurances that the significant
vulnerability at each step will be significantly minimized or prevented
and the food manufactured, processed, packed, or held by the facility
will not be adulterated (proposed Sec. 121.135).
Establish and implement procedures, including the
frequency with which they are to be performed, for monitoring the
focused mitigation strategies (proposed Sec. 121.140).
Establish and implement corrective action procedures that
must be taken if focused mitigation strategies are not properly
implemented (proposed Sec. 121.145).
Verify that monitoring is being conducted and appropriate
decisions about corrective actions are being made; verify that the
focused mitigation strategies are consistently implemented and are
effectively and significantly minimizing or preventing the significant
vulnerabilities; and conduct a reanalysis of the food defense plan
(proposed Sec. 121.150).
Ensure that personnel and supervisors assigned to
actionable process steps receive appropriate training in food defense
awareness and their respective responsibilities in implementing focused
mitigation strategies (proposed Sec. 121.160).
Establish and maintain certain records, including the
written food defense plan; written identification of actionable process
steps and the assessment leading to that identification; written
focused mitigation strategies; written procedures for monitoring,
corrective actions, and verification; and documentation related to
training of personnel (proposed Sec. Sec. 121.301 to 121.325).
As proposed, the effective date is 60 days after a final rule is
published. However, we are providing for a longer timeline for
facilities to come into compliance. Facilities, other than small and
very small businesses, would have one year after the effective date to
comply with proposed part 121. Small businesses (i.e., those employing
fewer than 500 persons) would have 2 years after the effective date to
comply with proposed part 121. Very small businesses (i.e., businesses
that have less than $10,000,000 in total annual sales of food, adjusted
for inflation) would be considered a qualified facility and would have
3 years after the effective date to comply with proposed Sec.
121.5(a).
BILLING CODE 4160-01-P
[[Page 78019]]
[GRAPHIC] [TIFF OMITTED] TP24DE13.027
BILLING CODE 4160-01-C
[[Page 78020]]
In addition, we describe our current thinking and seek comment on
other issues, including activities that occur on dairy farms and
economically motivated adulteration. Finally, elsewhere in this issue
of the Federal Register, FDA is publishing for comment its evaluation
that identifies low-risk activities that occur at farm mixed-type
facilities, with a specific focus on the risk presented by hazards that
may be intentionally introduced by acts of terrorism.
Costs and Benefits
As described in the Preliminary Regulatory Impact Analysis (PRIA),
we estimate the annualized costs of the actions required by this
proposed rule to be about $370 million. The benefits of these actions
are a reduction in the possibility of illness, death, and economic
disruption resulting from intentional adulteration of food. We are
unable to quantify these benefits. However, we monetize the damage that
various intentional adulteration scenarios might cause, and present a
breakeven analysis showing the number of prevented attacks at which the
benefits are larger than the costs.
Annualized Cost and Benefit Overview
------------------------------------------------------------------------
All numbers are USD millions,
annualized over 10 years 3% discount 7% discount
------------------------------------------------------------------------
Costs:
Learning about Rule............. $3 $3
Mitigation Costs................ 59 63
Monitoring and Corrective Action 100 100
Employee Training............... 4 5
Documentation................... 6 6
-----------------------------------
Subtotal (Domestic cost).... 172 177
Cost to Foreign Firms........... 185 190
-----------------------------------
Total....................... 357 367
-----------------------------------
Benefits: Lower Chance of
Intentional Adulteration........... Unquantified.
------------------------------------------------------------------------
I. Introduction
The FDA Food Safety Modernization Act (FSMA) (Pub. L. 111-353),
signed into law on January 4, 2011, enables FDA to better protect
public health by helping to ensure the safety and security of the food
supply. FSMA enables us to focus more on preventing food safety
problems rather than primarily reacting to problems after they occur.
The law also provides us with new enforcement authorities to help us
achieve higher rates of compliance with prevention- and risk-based
safety standards and to better respond to and contain problems when
they do occur. In addition, the law gives us important new tools to
better ensure the safety of imported foods and directs us to build an
integrated national food safety system in partnership with State,
local, tribal, and territorial authorities.
Section 103 of FSMA directs FDA to issue regulations establishing
requirements for facilities that manufacture, process, pack or hold
food and requires facilities to consider hazards that may be
intentionally introduced, including by acts of terrorism. Section 106
of FSMA requires FDA to issue regulations to protect food for which
there is a high risk of intentional contamination and for which such
intentional contamination could cause serious adverse health
consequences or death to humans or animals. In addition, section 105 of
FSMA directs FDA to issue regulations setting forth science-based
minimum standards for the safe production and harvesting of produce,
and requires that the rulemaking consider hazards that may be
intentionally introduced, including by acts of terrorism.
Efforts to protect against intentional adulteration require a shift
in perspective from that applied to traditional food safety. In
proposed rules entitled ``Current Good Manufacturing Practice and
Hazard Analysis and Risk-Based Preventive Controls for Human Food'' (78
FR 3646, January 16, 2013) (Docket No. FDA-2011-N-0920; hereafter
referred to as ``the PC proposed rule''), ``Current Good Manufacturing
Practice and Hazard Analysis and Risk-Based Preventive Controls for
Food for Animals'' (78 FR 64736, October 29, 2013) (Docket No. FDA-
2011-N-0922; hereafter referred to as ``the Animal Food PC proposed
rule''), and ``Standards for the Growing, Harvesting, Packing and
Holding of Produce for Human Consumption'' (78 FR 3504, January 16,
2013) (Docket No. FDA-2011-N-0921; hereafter referred to as ``the
Produce Safety proposed rule''), FDA tentatively decided not to include
requirements to address ``hazards that may be intentionally introduced,
including by acts of terrorism'' (sections 418(b)(2) and 419(a)(3)(C)
of the FD&C Act (21 U.S.C. 350g(b)(2) and 350h(a)(3)(C))) and to
implement sections 103 and 105 of FSMA regarding such hazards in a
separate rulemaking (this proposed rule). As noted in those proposed
rules, FDA tentatively concluded that intentional adulteration, which
is not addressed by traditional Hazard Analysis and Critical Controls
Point (HACCP) or other food safety systems, likely will require
different kinds of controls. FDA is taking the action described in this
proposed rule to implement the intentional adulteration provisions in
sections 103, 105, and 106 of FSMA.
II. Background
Intentional adulteration of the food supply can result in
catastrophic public health consequences, widespread public fear, loss
of public confidence in the safety of food and the ability of
government to ensure food safety, and significant adverse economic
impacts, including disruption of trade (Ref. 1, Ref. 2, Ref. 3, Ref.
4). Acts of intentional adulteration may take several forms, including
acts of terrorism; acts of disgruntled employees, consumers, or
competitors; and economically motivated adulteration. Acts of terrorism
are associated with an intent to cause massive public health harm and,
to a lesser extent, economic disruption (Ref. 5, Ref. 2, Ref. 3, Ref.
6). Acts of disgruntled employees, consumers, or competitors are
generally understood to be directed at attacking the reputation of the
company and not at public health harm. The primary purpose of
economically motivated adulteration is to obtain economic gain, and not
to impact public health (Ref. 7, Ref. 8, Ref. 9), although public
health harm may occur (Ref. 10, Ref. 11).
[[Page 78021]]
``Food defense'' and ``food security'' are terms that are sometimes
used interchangeably. We use the term ``food defense'' to refer to the
effort to protect food from acts of intentional adulteration where
there is an intent to cause public health harm and economic disruption.
``Food security'' is defined by the World Health Organization (WHO) to
mean ``when all people at all times have access to sufficient, safe,
nutritious food to maintain a healthy and active life'' (Ref. 12). To
avoid confusion, we use the term ``food defense'' and not the term
``food security'' in the context of intentional adulteration.
A. Incidents of Intentional Adulteration of Food
Several cases of intentional adulteration with the intent to cause
public health harm and economic disruption in the United States have
been documented. For example, in 1984, in an attempt to prevent the
general public from voting in the local elections, members of a local
religious commune in The Dalles, OR, intentionally contaminated food in
restaurants with Salmonella. A total of 751 people became ill and 45
were hospitalized (Ref. 4). In another incident, in 1996, 12 laboratory
workers at a large medical facility in Texas became ill from consuming
anonymously donated pastries that were intentionally contaminated with
Shigella dysenteriae type 2, which was later discovered to have
originated from the facility's stock culture (Ref. 13). In 2009, two
related incidents resulted in 49 individuals reporting rapid and acute
onset of gastrointestinal and neurological symptoms after eating meals
at a restaurant in Lenexa, KS. Investigations concluded that the
illnesses were caused by methomyl (an insecticide) poisoning associated
with the consumption of salsa at the restaurant. Two former employees
of the restaurant were found guilty of intentionally contaminating the
salsa (Ref. 14).
A widespread incident of economically motivated adulteration
occurred in China in 2008. Some Chinese milk firms added melamine, a
nitrogen-rich industrial by-product, to diluted dairy products to
increase the apparent protein content. This adulteration resulted in
significant public health consequences, with more than 290,000 ill
infants and 6 deaths in China. In addition, this incident caused
significant economic disruption within the Chinese dairy industry, with
estimates approaching $3 billion in loss to industry (Ref. 10, Ref.
11).
B. Interagency Approach to Food Defense
1. Homeland Security Presidential Directives and Presidential Policy
Directives for the Food and Agriculture Sector
Intelligence gathered since the attacks on the United States on
September 11, 2001, indicates that terrorist organizations have
discussed contamination of the food supply as a means to harm U.S.
citizens and disrupt the global economy (Ref. 15). In response, FDA,
along with the Centers for Disease Control and Prevention (CDC), the
United States Department of Agriculture (USDA), the Department of
Homeland Security (DHS), the Federal Bureau of Investigation (FBI), the
Environmental Protection Agency (EPA), the Department of Defense, the
Department of Energy, the Department of Commerce, and the Department of
the Interior, as well as with State, local, tribal, territorial, and
private sector partners have coordinated efforts to prevent, prepare
for, and respond to threats against the food supply. Many of these
efforts were accomplished in accordance with applicable Homeland
Security Presidential Directives (HSPD), specifically HSPD-7, HSPD-8,
and HSPD-9, and Presidential Policy Directives (PPD), specifically PPD-
8 and PPD-21 (Ref. 16, Ref. 17, Ref. 18, Ref. 19, Ref. 20). In
accordance with these directives, FDA, USDA, DHS, State and local
governments and the food industry collaborated to conduct vulnerability
assessments of a variety of products and processes within the food and
agriculture sector.
2. The Evolution of Vulnerability Assessments
Initially, FDA used Operational Risk Management (ORM), which is a
vulnerability assessment methodology that uses a six-step sequence of
identifying hazards and reducing the potential for negative public
health consequences. The ORM process resulted in three main outcomes:
(1) A calculation of risk by combining assessments of severity and
probability of an attack on a specific food; (2) calculations for
specific contaminants and specific food processes or related
activities; and (3) a categorization of specific food/contaminant/food
process or related activity into a high, medium, or low risk scheme.
At first, ORM-based assessments were focused on reducing large
public health consequences of attacks on the food supply. FDA realized
that other significant considerations (i.e., large economic
disruptions, public alarm, loss of confidence in the food supply, and
interruption of the food stream) warranted incorporation into the
vulnerability assessment calculus. To incorporate these considerations,
FDA and USDA's Food Safety and Inspection Service (FSIS) adapted a
military targeting tool known as CARVER to assess vulnerabilities of
the food and agriculture sector. CARVER is an acronym for the following
six attributes used to evaluate the attractiveness of a target for
attack:
Criticality--measure of public health and economic impacts
of an attack;
Accessibility--ability to physically access and egress
from target;
Recuperability--ability of a system to recover from an
attack;
Vulnerability--ease of accomplishing an attack;
Effect--amount of direct loss from an attack as measured
by loss in production; and
Recognizability--ease of identifying a target.
A seventh attribute, ``Shock'', was added to the original six
attributes to assess the combined health, economic, and psychological
impacts of an attack on the food industry. ORM and CARVER+Shock
assessment conclusions were consistent; however, the CARVER+Shock
methodology improved vulnerability assessment efforts because its
process allowed for the identification and estimation of economic and
psychological impacts throughout the food system.
In 2005, the Strategic Partnership Program Agroterrorism (SPPA), a
public-private cooperative effort was established by FDA, USDA, FBI,
and DHS, in partnership with State and industry partners. The intent of
the SPPA Initiative was to collect the necessary data to identify food
and agriculture sector-specific vulnerabilities using the CARVER+Shock
method, develop mitigation strategies, identify research gaps, and
increase coordination between government and industry partners. The
SPPA initiative ran from 2005 to 2008, resulting in vulnerability
assessments of 36 food products and processes (Ref. 21). The SPPA
Initiative was a significant step towards identifying vulnerabilities,
mitigation strategies, and research needs within the food and
agriculture industries. This initiative also provided Federal, State,
and local government agencies with an in-depth look at the
vulnerabilities that may be associated with the food and agriculture
industry, and helped enhance communication among industry, government,
and law enforcement
[[Page 78022]]
stakeholders concerned with the protection of the U.S. food supply.
Since the conclusion of the SPPA Initiative, we have conducted
additional vulnerability assessments, which continue to help inform our
research and policy.
C. Resources for the Food Sector
FDA has issued guidance documents and developed other resources to
assist industry in their efforts to protect the food supply against
intentional adulteration. In 2003, FDA issued five guidance documents
covering food defense preventive measures for various segments of the
food and cosmetic industry: (1) Guidance for Industry: Food Producers,
Processors, and Transporters: Food Security Preventive Measures
Guidance (Ref. 22); (2) Guidance for Industry: Importers and Filers:
Food Security Preventive Measures Guidance (Ref. 23); (3) Guidance for
Industry: Dairy Farms, Bulk Milk Transporters, Bulk Milk Transfer
Stations and Fluid Milk Processors: Food Security Preventive Measures
Guidance (Ref. 24); (4) Retail Food Stores and Food Service
Establishments: Food Security Preventive Measures Guidance (Ref. 25);
and(5) Cosmetics Processors and Transporters of Cosmetics Security
Preventive Measures Guidance (Ref. 26). These guidance documents
provide FDA's recommendations for best practices in food defense, and
describe preventive measures that establishments can take to minimize
the risk of intentional adulteration of food. We updated the guidance
documents in 2007 to include a self-assessment tool that guides the
user through an assessment of recommended preventive measures to
identify those most applicable to the facility.
FDA also has made available other resources to help industry
identify and mitigate potential vulnerabilities for intentional
adulteration. These include:
The ``ALERT'' program,
The ``Employees FIRST'' training tool,
The ``CARVER+Shock Vulnerability Assessment'' software
tool,
The ``Mitigations Strategies Database,''
The ``Food Defense Plan Builder'' software tool,
The Food Related Emergency Exercise Bundle, and
The ``Food Defense 101'' training courses.
We describe each briefly in this section of the document.
The ALERT program, originally released in 2006, is an educational
program intended to raise the awareness of State and local governments
and industry regarding food defense (Ref. 27). ALERT identifies five
key elements that industry can use in food defense planning:
A--How do you ASSURE that the supplies and ingredients you
use are from safe and secure sources?
L--How do you LOOK after the security of the products and
ingredients in your facility?
E--What do you know about your EMPLOYEES and people coming
in and out of your facility?
R--Could you provide REPORTS about the security of your
products while under your control?
T--What do you do and who do you notify if you have a
THREAT or issue at your facility, including suspicious behavior?
Similarly, the Employees FIRST educational tool, originally
released in 2008, is a food defense awareness training program for
front-line food industry workers about the risk of intentional
adulteration and the actions they can take to identify and reduce these
risks (Ref. 28). This tool identifies the following five key elements:
F--Follow company food defense plan and procedures;
I--Inspect your work area and surrounding areas;
R--Recognize anything out of the ordinary;
S--Secure all ingredients, supplies, and finished product;
and
T--Tell management if you notice anything unusual or
suspicious.
The CARVER+Shock Vulnerability Assessment software tool, originally
released in 2007, helps users conduct vulnerability assessments for
their establishments to identify and prioritize the ``critical nodes,''
(also known as critical process steps) the potential targets vulnerable
to intentional adulteration attacks (Ref. 29). It guides users through
a series of questions to determine the vulnerability of each of the
nodes within their facility. After the vulnerabilities are identified,
the software helps users to identify mitigation strategies for reducing
the risk of intentional adulteration. Using the software tool, the user
can focus resources on protecting the most susceptible points in their
system.
The Mitigation Strategies Database (MSD), originally released in
2011, is a database of mitigation strategies that can be applied to
different steps in a food operation to reduce the risk of intentional
adulteration (Ref. 30). The database is searchable by key words and
processing steps common to agriculture and food operations (e.g.,
growing, harvesting, packing, manufacturing, processing, and holding).
See also the discussion in section V.C.3 of this document.
The Food Defense Plan Builder (FDPB) software tool, released in
2013, is a user-friendly computer software program designed to assist
owners and operators of food facilities in developing food defense
plans for their facilities (Ref. 31). In addition to providing new
functionality for food defense planning and implementation, the FDPB
software tool harnesses our food defense guidance documents,
CARVER+Shock Vulnerability Assessment software tool, and the MSD into a
single application.
The Food Related Emergency Exercise Bundle (FREE-B), which FDA
released in 2011 and developed in collaboration with CDC and FSIS and
USDA's Animal and Plant Health Inspection Service (APHIS), is a
compilation of scenarios based on both intentional and unintentional
food contamination events. The FREE-B is designed to assist the food
industry, government regulatory agencies, and public health
organizations in assessing existing food emergency response plans,
protocols, and procedures (Ref. 32). The FREE-B tool is designed to
allow an individual agency or industry entity to test its own plans,
protocols, and procedures independently. Additionally, the tool allows
multiple jurisdictions and organizations (e.g., medical community,
private sector, law enforcement, and first responder communities) to
jointly conduct exercises. The tool is a set of five scenarios, each of
which contains a Facilitator's Guide, a Lead Planner's guide, and a
Situation Manual.
Finally, our food defense training courses, entitled ``Food Defense
101'' and released in 2013, reflect FDA's current thinking on how to
minimize the likelihood and impact of incidents of intentional
adulteration (Ref. 27). Four courses integrated into one module
include: (1) Food Defense Awareness for Professionals, (2) Food Defense
Awareness for Frontline Employees, (3) FDA Regulations, and (4) ALERT
for owners and operators of food facilities. The ALERT program is
described previously. The other programs are described in section V.C.7
of this document.
D. Outreach
We have conducted food defense awareness outreach to international
and domestic stakeholders. Beginning in 2008, under the auspices of the
Asia-Pacific Economic Cooperation (APEC), we collaborated with the U.S.
Department of State, USDA's Foreign Agricultural Service, and FSIS to
launch the Food Defense Pilot Program for the
[[Page 78023]]
APEC member countries. The Pilot Program was developed with the intent
to implement the food defense principles endorsed by the APEC Counter
Terrorism Task Force. The goal of the program was to build and foster
global capacity to prevent and protect against deliberate tampering and
intentional contamination of the food supply through information
sharing, outreach, and technical assistance on food defense, thereby
safeguarding food trade and public health across the APEC member
countries. In addition, to support the international capacity building
goals of FSMA, we conducted several workshops in various countries to
discuss topics such as increasing food defense awareness, developing
food defense plans, conducting vulnerability assessments, and
implementing mitigation strategies.
In 2013, we increased our domestic outreach activities with a
series of workshops in the United States. Using a similar format and
agenda as the international workshops, we conducted 1-day food defense
awareness workshops to provide industry, State and local governments,
and academic partners with information on food defense, and share tools
and resources. During these workshops, we shared information on how to
use the new FDPB software tool to develop a comprehensive food defense
plan. These workshops also served as a forum to discuss food defense
concerns, understand industry's current practices, and share ideas for
collaboration to better protect the food supply against intentional
adulteration. We plan to continue to hold additional workshops in 2014.
E. Industry Standards
Guidelines accompanying industry standards in the United States
have addressed intentional adulteration of food. For example, the
Global Food Safety Initiative's (GFSI) Guidance Document Sixth Edition
(Ref. 33) addresses food defense. Some organizations that own and
manage industry standards have worked or are working to incorporate
food defense requirements into their standards to meet this GFSI
guideline. For example, the Safe Quality Foods (SQF) Code, edition 7.1,
issued in 2013, is a process and product certification standard that
specifies various food defense elements, including that the methods,
responsibility, and criteria for preventing food adulteration caused by
a deliberate act of sabotage or terrorist-like incident shall be
documented, implemented and maintained (Ref. 34). Another example of
industry standards that incorporate food defense elements is the
International Featured Standards (IFS) Food Version 6 Standard, which
specifies that areas critical to security be identified, food defense
hazard analysis and assessment of associated risks be conducted
annually or upon changes that affect food integrity, and an appropriate
alert system be defined and periodically tested for effectiveness (Ref.
35).
F. International Food Defense Guidelines
In 2008, WHO issued its ``Terrorist Threats to Food--Guidelines for
Establishing and Strengthening Prevention and Response Systems'' to
provide policy guidance to its Member States for integrating
consideration of deliberate acts of sabotage of food into existing
prevention and response programs (Ref. 6). WHO uses the term ``food
terrorism'' and defines it as ``an act or threat of deliberate
contamination of food for human consumption with biological, chemical
and physical agents or radionuclear materials for the purpose of
causing injury or death to civilian populations and/or disrupting
social, economic or political stability.'' Focusing on the two key
strategies of prevention and response, WHO recommends that all segments
of the food industry consider the development of security and response
plans for their establishments, proportional to the threat and their
resources. The guidelines state that the key to preventing food
terrorism is enhancing existing food safety programs and implementing
reasonable security measures on the basis of vulnerability assessments.
The guidelines further state that the most vulnerable foods, food
ingredients, and food processes should be identified, including: the
most readily accessible food processes; foods that are most vulnerable
to undetected tampering; foods that are the most widely disseminated or
spread; and the least supervised food production areas and processes.
Other national governments, including Australia, China, France,
Germany, and the United Kingdom, also have issued guidelines to assist
their food industry stakeholders in protecting food against intentional
adulteration (Ref. 5, Ref. 36, Ref. 37, Ref. 38, Ref. 39).
III. Legal Authority
FDA is proposing this regulation under the FD&C Act as amended by
FSMA. Under sections 103 and 106 of FSMA, FDA is proposing the
requirements applicable to the owner, operator, or agent in charge of a
facility required to register under section 415 of the FD&C Act. Under
section 106 of FSMA, FDA is proposing the requirements applicable to
activities at some facilities not covered by section 103 of FSMA (i.e.,
activities subject to and in compliance with the juice and seafood
HACCP regulations in parts 120 and 123 (21 CFR parts 120 and 123) and
the manufacturing, processing, packing, or holding of a dietary
supplement in compliance with certain requirements). Under section
701(a) of the FD&C Act (21 U.S.C. 371(a)), FDA is authorized to issue
regulations for the efficient enforcement of the FD&C Act.
A. Section 103 of FSMA
Section 103 of FSMA, Hazard Analysis and Risk-Based Preventive
Controls, amends the FD&C Act to create a new section 418 that mandates
rulemaking. Section 418(n)(1)(A) of the FD&C Act requires that the
Secretary of Health and Human Services issue regulations ``to establish
science-based minimum standards for conducting a hazard analysis,
documenting hazards, implementing preventive controls, and documenting
the implementation of the preventive controls . . ..'' Section
418(n)(1)(B) of the FD&C Act requires that the regulations define the
terms ``small business'' and ``very small business,'' taking into
consideration the study of the food processing sector required by
section 418(l)(5) of the FD&C Act. Further, section 103(e) of FSMA
creates a new section 301(uu) in the FD&C Act (21 U.S.C. 331(uu)) to
prohibit ``[t]he operation of a facility that manufactures, processes,
packs, or holds food for sale in the United States if the owner,
operator, or agent in charge of such facility is not in compliance with
section 418 [of the FD&C Act].''
In addition to rulemaking requirements, section 418 of the FD&C Act
contains requirements applicable to the owner, operator, or agent in
charge of a facility required to register under section 415 of the FD&C
Act. Section 418(a) of the FD&C Act is a general provision that
requires the owner, operator, or agent in charge of a facility to
evaluate the hazards that could affect food manufactured, processed,
packed, or held by the facility, identify and implement preventive
controls, monitor the performance of those controls, and maintain
records of the monitoring. In addition to the general requirements in
section 418(a) of the FD&C Act, sections 418(b) to (i) of the FD&C Act
contain more specific requirements applicable to facilities, including
several provisions explicitly directed at intentional adulteration. For
example, section 418(b)(2) of the FD&C Act specifies that the owner,
operator, or
[[Page 78024]]
agent in charge of a facility shall identify and evaluate hazards that
may be intentionally introduced, including by acts of terrorism.
Section 418(c)(2) of the FD&C Act specifies that the owner, operator,
or agent in charge of a facility shall identify and implement
preventive controls to provide assurances that any hazards that relate
to intentional adulteration will be significantly minimized or
prevented and addressed, consistent with section 420 of the FD&C Act.
In sections IV and V of this document, we discuss proposed requirements
(proposed subparts C and D of part 121) that would implement these
provisions of section 418 of the FD&C Act.
Sections 418(j) to (m) of the FD&C Act and sections 103(c)(1)(D)
and (g) of FSMA provide authority for certain exemptions and
modifications to the requirements of section 418 of the FD&C Act. These
include provisions related to seafood and juice HACCP, and low-acid
canned food (section 418(j) of the FD&C Act); activities of facilities
subject to section 419 of the FD&C Act (Standards for Produce Safety)
(section 418(k)); qualified facilities (section 418(l)); facilities
that are solely engaged in the production of food for animals other
than man, the storage of raw agricultural commodities (other than
fruits and vegetables) intended for further distribution or processing,
or the storage of packaged foods that are not exposed to the
environment (section 418(m)); facilities engaged only in certain low-
risk on-farm activities on certain foods conducted by small or very
small businesses (section 103(c)(1)(D) of FSMA), and dietary
supplements (section 103(g) of FSMA). In sections IV and V of this
document, we discuss the related proposed provisions that would
implement these provisions of section 418 of the FD&C Act and section
103 of FSMA.
B. Section 106 of FSMA
Section 106 of FSMA, Protection Against Intentional Adulteration,
amends the FD&C Act to create a new section 420, which mandates
rulemaking. Section 420 of the FD&C Act requires FDA to issue
regulations to protect against the intentional adulteration of food.
Section 420(b)(1) of the FD&C Act requires that such regulations are to
specify how a person is to assess whether the person is required to
implement mitigation strategies or measures intended to protect against
the intentional adulteration of food. Section 420(b)(2) of the FD&C Act
requires that the regulations specify appropriate science--based
mitigation strategies or measures to prepare and protect the food
supply chain at specific vulnerable points, as appropriate. Section
420(c) of the FD&C Act provides that such regulations are to apply only
to food for which there is a high risk of intentional adulteration and
for which such intentional adulteration could cause serious adverse
health consequences or death to humans or animals. Section 420(c)(1)
provides that such foods are to include those for which FDA has
identified clear vulnerabilities. Section 420(d) of the FD&C Act limits
applicability on farms to farms that produce milk. Further, section
106(d) of FSMA creates a new section 301(ww) in the FD&C Act to
prohibit ``[t]he failure to comply with section 420 [of the FD&C
Act].'' We are proposing all of the provisions under section 420 of the
FD&C Act.
C. Intrastate Activities
FDA tentatively concludes that the provisions in the proposed rule
should be applicable to activities that are intrastate in character.
Facilities are required to register under section 415 of the FD&C Act
regardless of whether the food from the facility enters interstate
commerce (Sec. 1.225(b)). The plain language of section 418 of the
FD&C Act applies to facilities that are required to register under
section 415 of the FD&C Act (section 418(o)(2)) and does not exclude a
facility because food from such a facility is not in interstate
commerce. Similarly, the plain language of section 420 of the FD&C Act
requires FDA to issue regulations to protect against the intentional
adulteration of food and does not include a limitation to interstate
commerce. Further, the prohibited act provisions in sections 301(uu)
and (ww) of the FD&C Act (21 U.S.C. 331(uu) and (ww)) do not require an
interstate commerce nexus. Notably, other subsections in section 301 of
the FD&C Act, and section 304 of the FD&C Act (21 U.S.C. 334)
demonstrate that Congress has included a specific interstate commerce
nexus in the provisions of the FD&C Act when that is its intent.
Accordingly, it is reasonable to interpret sections 418, 420, 301(uu)
and (ww) of the FD&C Act as not limiting the application of the
proposed rule only to those facilities with a direct connection to
interstate commerce. However, we seek comment on this interpretation
and potential alternatives.
IV. Regulatory Approach
A. Framework of the Rule
This proposed regulation implements three provisions of FSMA that
relate to the intentional adulteration of food. Section 103 of FSMA
addresses intentional adulteration in the context of facilities that
manufacture, process, pack, or hold food and are required to register
under section 415 of the FD&C Act. Section 105 of FSMA addresses
intentional adulteration in the context of fruits and vegetables that
are raw agricultural commodities. Section 106 of FSMA addresses
intentional adulteration in the context of high risk foods and exempts
farms except for farms that produce milk.
1. Scope of Intentional Adulteration Covered by this Rule
As noted in section I of this document, acts of intentional
adulteration may take several forms, including: (1) Acts of terrorism;
(2) acts of disgruntled employees, consumers, or competitors; and (3)
economically motivated adulteration. With regard to intentional
adulteration from acts of terrorism, we are proposing to require
certain facilities covered by this rule to address significant
vulnerabilities by implementing focused mitigation strategies at
actionable process steps. While we refer to the protection of the food
supply from ``acts of terrorism'' throughout this rule, we expect our
proposed approach and the proposed implementation of focused mitigation
strategies would generally address acts intended to cause massive
public health harm and, to a lesser extent, economic disruption,
whether committed by terrorists, terrorist organizations, individuals,
or groups of individuals. For the reasons described in section IV.E of
this document, we have tentatively concluded not to propose additional
requirements for the protection of food against intentional
adulteration caused by acts of disgruntled employees, consumers, or
competitors. We describe our approach to address economically motivated
adulteration in section IV.F of this document, and seek comment on our
current thinking on this issue.
2. Identification of Key Activity Types
Terrorist attacks on the U.S. food supply have been exceedingly
rare. However, vulnerability assessments performed by FDA, USDA, DHS,
and FBI, under the SPPA Initiative (Ref. 21), show that an attack could
have devastating public health and economic consequences. Because such
an attack is a low probability but potentially exceedingly high
consequence event, we have tentatively determined that requirements
should focus on those facilities and process steps within those
facilities that pose the greatest risk. To
[[Page 78025]]
assess this risk, FDA and USDA, in collaboration with DHS, FBI, and
State and local government and industry partners, performed
vulnerability assessments using the CARVER+Shock methodology. This
methodology is specifically tailored to assess the risk of a terrorist
attack and is different from an assessment of risk posed by food safety
hazards (i.e., unintentional adulteration).
As discussed in section V.C.2 of this document, based on an
analysis of the vulnerability assessments that FDA has conducted using
the CARVER+Shock methodology, we have identified four key activity
types: Bulk liquid receiving and loading; Liquid storage and handling;
Secondary ingredient handling; and Mixing and similar activities. FDA
has tentatively determined that the presence of one or more of these
key activity types at a process step (e.g., manufacturing, processing,
packing, or holding of food) indicates a significant vulnerability
under section 418 of the FD&C Act and that the food is at high risk of
intentional adulteration caused by acts of terrorism under section 420
of the FD&C Act. We seek comment on the inclusion of these key activity
types.
Designation of these key activity types would serve two purposes.
First, it would provide a facility with a means to assess whether it is
required to implement focused mitigation strategies or measures
intended to protect against intentional adulteration under section
420(b)(1) of the FD&C Act. Second, it would assist a facility subject
to section 418 of the FD&C Act with the performance of a hazard
analysis to identify and evaluate hazards that may be intentionally
introduced by acts of terrorism, in accordance with section 418(b)(2).
Facilities would be able to determine whether their operations
involve one or more of the key activity types or choose to perform a
vulnerability assessment. Our experience is that the most challenging
part of developing a system of controls for intentional adulteration
related to terrorism is identifying the points in the food operation
that are most vulnerable to attack by performing a vulnerability
assessment. By using the FDA-identified key activity types, facilities
would be able to concentrate their efforts on the identification of
appropriate focused mitigation strategies and the development and
implementation of the HACCP-type system for ensuring that those
strategies are consistently and effectively implemented.
3. Requirement for a HACCP-Type System of Controls
We have tentatively concluded that a preventive controls approach
like the one we proposed for the systematic control of food safety
hazards in the PC proposed rule is the most effective means of ensuring
that the focused mitigation strategies are consistently applied once
the significant vulnerabilities are identified and appropriate focused
mitigation strategies are developed. The evolution and advantages of
this system, derived from the HACCP methodology, is discussed in detail
in section II.C of the PC proposed rule. The application of HACCP-type
controls for ensuring the implementation of food defense mitigation
strategies is consistent with the approach taken in Publicly Available
Specification (PAS) 96, developed by the Centre for the Protection of
National Infrastructure in collaboration with the British Standards
Institution, entitled ``The Threat Assessment Critical Control Point
(TACCP) Approach'' (Ref. 5). It is also consistent with WHO
recommendations on protection against intentional adulteration (Ref.
6). We request comment on the appropriateness of a HACCP-type system to
ensure that mitigation strategies designed to significantly minimize or
prevent intentional adulteration related to terrorism and whether there
are approaches that would be more suitable.
Section 418 of the FD&C Act exempts several kinds of activities
(e.g., those related to seafood, juice, dietary supplements, low-acid
canned food [for certain microbiological hazards]). These activities
are subject to preventive control-type regulations that address food
safety, but not food defense, concerns. Section 420 of the FD&C Act
instructs FDA to issue regulations to require that science-based
mitigation strategies or measures be applied to foods that are at high
risk of intentional adulteration. The exemptions set out in section 418
of the FD&C Act are not applicable to the provisions of section 420 of
the FD&C Act. We also have tentatively determined that some activities
that are not subject to section 418 of the FD&C Act that involve
manufacturing, processing, packing, or holding of food are likely to
involve one of the key activity types (e.g., juice manufacturing,
breaded seafood manufacturing, and mixing activity in a low-acid canned
food process). Based on our tentative conclusion that the HACCP-type
system in section 418 of the FD&C Act is generally appropriate for
application to intentional adulteration related to terrorism, this same
system would be required for these activities. Applying the same
regulatory framework under sections 418 and 420 of the FD&C Act would
facilitate a concise and consistent approach to protection against
intentional adulteration of food and the efficient enforcement of the
requirements. Further, this approach would be consistent with the
approach for unintentional adulteration that many of these facilities
(those subject to section 418 of the FD&C Act relative to the control
of food safety hazards) would already be required to take for
unintentional hazards under the PC proposed rule.
We acknowledge that regulation of entities in the food production
system (in this case, facilities) to reduce the risk of intentional
adulteration of food caused by acts of terrorism is, essentially,
without precedent. Such an endeavor is further complicated by the low
probability and potentially high impact nature of such an attack which
makes estimating potential public health benefits and establishing an
appropriate threshold for requiring action difficult. We are further
challenged by the paucity of data on the extent to which facilities
have already implemented programs to mitigate this risk, and the
effectiveness of various strategies to prevent intentional adulteration
of food caused by acts of terrorism.
In developing this proposed rule we have relied on our experience
in both implementing preventive control schemes targeting unintentional
food safety hazards as well as working with the U.S. intelligence
community on the threat of a terrorist attack on the food and
agriculture sector, including performing vulnerability assessments and
developing guidance for industry. While these activities have provided
us with a useful foundation on which to develop this proposed rule, the
challenges described previously remain. We request comment on our
proposed approach, including on the following issues:
From which entities would implementation of measures to
protect against intentional adulteration derive the greatest benefit to
public health protection? How could this proposed regulation be
modified to better target such entities?
Would it be feasible to require measures to protect
against intentional adulteration only in the event of a credible
threat? If so, would such an approach be consistent with the
intentional adulteration provisions of FSMA? How would such
requirements
[[Page 78026]]
be communicated to industry in a timely and actionable manner?
What is an appropriate level of public health protection
with respect to intentional adulteration, considering the intentional
adulteration provisions of FSMA?
Are there other ways to further focus the scope of the
rule (see also section IV.I of this document)?
4. Compliance Dates
Section 103(i)(1) of FSMA, General Rule, provides that ``[t]he
amendments made by this section shall take effect 18 months after the
date of enactment'' (i.e., by July 4, 2012). Section 103(i)(2) of FSMA,
Flexibility for Small Businesses, provides that ``[n]otwithstanding
paragraph (1),'' the amendments made by this section ``shall apply'' to
a small business and very small business beginning on the date that are
6 months and 18 months, respectively, ``after the effective date'' of
FDA's final regulation. Section 106 of FSMA does not contain similar
language. FDA is implementing the amendments made by sections 103 and
106 of FSMA to the FD&C Act, as they relate to intentional
adulteration, through this rulemaking.
We have tentatively concluded that it is appropriate to provide a
sufficient time period following publication of the final regulation
for facilities to come into compliance with proposed part 121. FDA
recognizes that it can take time to develop and implement a food
defense plan that would require, among other things, identification of
actionable process steps, implementation of focused mitigation
strategies, and monitoring of focused mitigation strategies.
FDA is proposing that the final rule would be effective 60 days
after publication in the Federal Register, with staggered compliance
dates, consistent with the proposed effective dates in the PC proposed
rule and Produce Safety proposed rule. Similarly, we recognize that
businesses of all sizes may need more time to comply with the new
requirements established under FSMA. As noted in section VII of the PC
proposed rule, FDA believes that it is reasonable to allow for 1 year
after the date of publication of the final rule for businesses other
than small and very small businesses to come into compliance with the
new requirements established under FSMA. FDA also believes that it is
reasonable to allow for 2 years after the date of publication of the
final rule for small businesses to come into compliance with the new
requirements established under FSMA, and 3 years after the date of
publication of the final rule for very small businesses to come into
compliance with the new requirements established under FSMA.
Therefore, as proposed, facilities, other than small and very small
businesses, that are subject to part 121 would have 1 year after the
effective date to comply with proposed part 121. Small businesses would
have 2 years after the effective date to comply with proposed part 121
(see section V.A of this document for a discussion of the proposed
definition of a ``small business''). With respect to very small
businesses, we are proposing to exempt qualified facilities, which
include very small businesses, from the requirements of proposed part
121, except that such facilities must, upon request, provide for
official review documentation that was relied upon to demonstrate that
the facility meets this exemption. Very small businesses then would
have 3 years after the effective date to comply with proposed Sec.
121.5(a). FDA intends to work closely with the food industry, extension
and education organizations, and State partners to develop any
necessary additional tools and training programs needed to facilitate
implementation of this rule.
B. Activities That Occur on Produce Farms
Section 419 of the FD&C Act requires FDA to issue regulations to
establish science-based minimum standards for the safe production and
harvesting of fruits and vegetables. In developing these regulations,
the Act requires us to consider, among others, those hazards that may
be intentionally introduced, including by acts of terrorism (section
419(a)(3)(C) and (c)(1)(A) of the FD&C Act). Note that neither section
418 of the FD&C Act nor section 420 of the FD&C Act apply to these
activities. Section 420 of the FD&C Act specifically exempts farms,
except those that produce milk, and section 418 of the FD&C Act exempts
activities of facilities subject to section 419 of the FD&C Act.
In implementing section 419 of the FD&C Act, we considered the
risks posed by a terrorist attack on the kinds of activities that occur
on produce farms. We considered those activities that fall within the
definition of ``farm'' (as defined in 21 CFR 1.227) (e.g., planting,
tilling, irrigating, treating with pesticides, harvesting, drying for
purposes of storing or transporting, hydro-cooling, packing,
refrigerating, waxing, shelling, sifting, removing leaves, stems and
husks, culling, shelling, and washing). We utilized data gathered from
vulnerability assessments that we conducted employing the CARVER+Shock
methodology, and evaluated whether activities that occur on produce
farms pose significant vulnerabilities (Ref. 40).
Our evaluation found that activities that are typically performed
on produce farms are at relatively low risk for intentional
adulteration of food from acts of terrorism (Ref. 40). Based on this
evaluation, we have tentatively concluded that requirements for produce
farms are not necessary to minimize the risk of serious adverse health
consequences or death from this type of adulteration. Further, we have
tentatively concluded that requirements relating to this form of
adulteration are not reasonably necessary to prevent the introduction
of known or reasonably foreseeable hazards and to provide reasonable
assurances that the produce is not adulterated under section 402 of the
FD&C Act. For these reasons, we are not proposing requirements for
produce farms to specifically address intentional adulteration related
to terrorism. We seek comment on this tentative conclusion and our
analysis that informed this tentative decision.
We acknowledge that there may be activities that occur on produce
farms for which we are not proposing requirements that are similar to
off-farm activities for which we are proposing to require the
implementation of focused mitigation strategies. However, there are
aspects of the specific on-farm activities that minimize the risk for
intentional adulteration caused by acts of terrorism. For example,
waxing is an on-farm activity that is similar to coating and that fits
within one of the key activity types. However, there are key
differences that make an on-farm waxing operation less vulnerable
compared to a coating operation. With waxing, there is difficulty of
mixing a contaminant into a clear, heated wax in a tank in close
proximity to the busy packing line in an on-farm packing house.
Conversely, a coating operation involves an opaque, ambient or
refrigerated, aqueous coating mix in a tank and occurs in a relatively
isolated part of the manufacturing plant. In addition, the uncertainty
about whether the produce leaving the farm is destined for direct
consumption or for further processing, such as removal of the wax,
which could inactivate or remove any contaminant intentionally added,
makes it a relatively less likely target for intentional adulteration.
C. Transportation Carriers
One of the key activity types that we have tentatively determined
indicates a significant vulnerability to intentional adulteration
caused by acts of terrorism
[[Page 78027]]
is Bulk liquid receiving and loading. As proposed, receiving and
loading of other types of foods (e.g., non-bulk liquids, solid foods,
gaseous foods) are not identified as key activity types because we
determined that they do not present this same level of risk. By
requiring that shippers and receivers of bulk liquids implement focused
mitigation strategies at actionable process steps involving this key
activity, as proposed in Sec. 121.135(a), we expect that shippers and
receivers will institute focused mitigation strategies that will
significantly minimize or prevent the potential for intention
adulteration of these foods during transportation. Such mitigation
strategies may include sealing or locking outbound conveyances of bulk
liquid, or requiring that inbound conveyances be sealed or locked as a
condition of receipt of the bulk liquid. Where such measures are
implemented by the shippers and receivers of bulk liquids, we have
tentatively concluded that the food would be sufficiently protected
from intentional adulteration caused by acts of terrorism, and that no
further actions by a carrier would be needed to ensure the safety of
the food. For this reason, we are not proposing to cover transportation
carriers in this proposed rule. We request comment on our analysis of
this issue, and our tentative conclusion.
Note that FDA will issue a proposed rule in the near future related
to transportation carriers and sanitary transportation practices.
D. Food for Animals
As discussed in section V.B.6 of this document, we are proposing to
exempt the manufacturing, processing, packing, and holding of animal
food from this proposed regulation with respect to intentional
adulteration caused by acts of terrorism.
E. Acts of Disgruntled Employees, Consumers, or Competitors
While the goals and outcomes of acts of disgruntled employees,
consumers or competitors can overlap with acts of terrorism, generally,
the distinction has to do with differences in scale. Disgruntled
employees are generally understood to be interested primarily in
attacking the reputation of the company, and otherwise have little
interest in public health harm. On the other hand, terrorist
organizations are generally understood to be interested in maximizing
public health harm and, to a lesser extent, economic disruption (Ref.
5, Ref. 6).
Section 420(c) of the FD&C Act requires that the regulation
prepared under that section apply to ``food for which there is a high
risk of intentional contamination.'' In the spectrum of risk associated
with intentional adulteration of food, attacks perpetrated by terrorist
organizations intent on causing massive casualties and, to a lesser
extent, economic disruption would be ranked as relatively high risk. On
the other hand, attacks by disgruntled employees, consumers, or
competitors would be consistently ranked as relatively low risk;
although these events occur annually, their public health and economic
impact would be generally quite small. In general, the target food and
the point in its production are those of convenience (i.e., a point to
which the employee, consumer, or competitor has ready access). Should a
disgruntled employee, consumer, or competitor choose to attack at an
actionable process step, where the adverse public health and economic
consequences could be greater, the provisions of this proposed rule
would be effective in minimizing the opportunity for success. Actions
taken to mitigate the potential for a terrorist attack against the food
supply are likely to have collateral benefits in reducing the potential
for an attack by a disgruntled employee, consumer, or competitor (as
well as on other security related issues, such as theft and vandalism).
As a practical matter, hardening the food supply (i.e., reducing the
opportunity for attack) to attacks by disgruntled employees, consumers,
or competitors could require taking steps at many more points in the
food system than would be required to harden the food supply to
minimize the potential for terrorist attack. We have tentatively
concluded that the latter can be accomplished by focusing on those
points in the food system where an attack would be expected to cause
massive adverse public health impact, and, to a lesser extent, economic
disruption.
F. Economically Motivated Adulteration
Efforts to protect against intentional adulteration require a shift
in perspective from that applied to traditional food safety. In the PC,
Animal Food PC, and Produce Safety proposed rules, we tentatively
concluded that hazards associated with intentional adulteration, which
are not addressed in traditional HACCP or other food safety systems,
likely will require different kinds of controls, and would be best
addressed in a separate rulemaking (this proposed rule). However, we
also explained how in some circumstances economically motivated
adulteration could be viewed as reasonably likely to occur. Further, we
requested comment on where to address those hazards that may be
intentionally introduced for economic gain. After additional
consideration, we present our current thinking in this section of the
document.
For facilities subject to section 418 of the FD&C Act, we have
tentatively concluded that economically motivated adulteration would be
best addressed under the regulatory regime described in the PC and
Animal Food PC proposed rules and thus best addressed in those
rulemakings. Before we decide to finalize provisions on economically
motivated adulteration in the PC and Animal Food PC final rules, FDA
plans to provide new language and an analysis of costs associated with
these provisions, and seek comment. Under this approach, the owner,
operator, or agent in charge of a covered facility would be required to
perform a hazard analysis to identify those hazards related to
economically motivated adulteration that are reasonably likely to
occur. Economically motivated adulteration could be reasonably likely
to occur, for example, when obtaining certain ingredients from a
country in which economically motivated adulteration has occurred in
those ingredients in the past. Because of past incidents regarding the
addition of melamine to certain food products apparently to enhance
perceived quality and/or protein content, even if there is no known
history regarding the specific supplier or the specific food product, a
prudent person would implement preventive controls to address the
potential presence of this hazard in a food. The goal of the
perpetrator of economically motivated adulteration is for the
adulterant to be undetected in the product, so that the perpetrator can
continue to obtain the desired economic benefits (Ref. 7, Ref. 9).
Accordingly, unlike with acts of terrorism, such occurrences of
economic adulteration are expected to be long term, and would not be
appropriately viewed as a rare occurrence, but rather as reasonably
likely to occur.
We have tentatively concluded that this hazard-analysis type
approach is better suited to address economically motivated
adulteration than the vulnerability assessment-type approach we are
proposing to address intentional adulteration related to terrorism. In
the latter approach, which we are not proposing, significant
vulnerabilities would be identified based either on the presence of key
activity types (which reflect FDA-conducted vulnerability assessments)
or facility-specific vulnerability assessments. Under a vulnerability
assessment-type approach,
[[Page 78028]]
the assessment would need to consider the degree to which a food is a
likely target for economically motivated adulteration based on the
attributes of the food (such as the nature of the food, its production
system, and its supply chain) and the capabilities of a perpetrator
(such as availability and access to adulterants that can be readily
disguised and undetected by currently accepted testing methods).
Factors to consider could include previous occurrences of economically
motivated adulteration; a highly complex supply chain; sudden changes
in commodity prices; known inadequacies in identification and assay
testing methods for potential adulterants; a highly complex and
variable food ingredient; the widespread availability of a potential
adulterant; the lack of organoleptic properties of a potential
adulterant; the high cost or scarcity of an ingredient; and variation
in the value of a food based on variations in levels of a high value
attribute of that food. The nature of economically motivated
adulteration makes it difficult to identify all relevant factors to be
considered in a vulnerability assessment to predict when novel events
of economic adulteration are expected to occur. Moreover, predictive
tools such as CARVER+Shock are not currently configured to assess the
risk of economically motivated adulteration, nor have extensive
vulnerability assessments for economically motivated adulteration in
food products been conducted by FDA or others. Therefore, we believe
the most appropriate framework to assess the risk of economically
motivated adulteration is to consider whether it is reasonably likely
to occur (such as whether it has occurred under similar circumstances
with some regularity in the past) as part of a hazard analysis.
Under this approach, facilities subject to section 418 of the FD&C
Act would be expected to implement controls against economically
motivated adulteration under circumstances where there has been a
pattern of such adulteration in the past, even though the past
occurrences may not be associated with the specific supplier or the
specific food product but the pattern suggests a potential for
intentional adulteration. Further, a system of monitoring, corrective
action, verification, and recordkeeping that is similar to those in the
PC and Animal Food PC proposed rules would be appropriate for
economically motivated adulteration. In addition, the elements of a
preventive control system, including hazard analysis, preventive
controls, monitoring, corrective actions, verification, and
recordkeeping would be documented in a food safety plan that would
include control of economically motivated adulteration. We believe that
addressing both of these potential sources for contamination within the
same framework is likely to streamline requirements and reduce costs to
industry.
We seek comment on our tentative conclusions presented above.
Specifically, we are interested in information on the specific factors
that are most relevant for determining whether economically motivated
adulteration is reasonably likely to occur, particularly in instances
where the specific product or supplier has not been previously
associated with such adulteration. In addition, we seek comment on
whether and how these relevant factors may be used to develop
appropriate predictive tools or establish a standard for when
preventive controls are necessary.
Section 418 of the FD&C Act contains certain exemptions related to
compliance with FDA's seafood and juice HACCP regulations and with
regard to manufacturing, processing, packing or holding dietary
supplements that are in compliance with the requirements of sections
402(g)(2) and 761 of the FD&C Act. Section 420 of the FD&C Act does not
contain these exemptions and requires FDA to issue regulations to
protect against the intentional adulteration of food. Seafood and juice
are currently subject to HACCP-type regulations in Sec. Sec. 123 and
120, respectively, and our current thinking is that under section 420
economically motivated adulteration could be addressed through the
existing frameworks for these foods. Under this option, FDA would amend
the seafood and juice HACCP regulations to specify that economically
motivated adulteration is a hazard that must be considered in a hazard
analysis of these foods, and addressed in a HACCP plan. For example,
for seafood, we could propose to add ``economically motivated
adulteration that could result in serious adverse health consequences
or death'' to the list of hazards to be considered in a hazard analysis
in accordance with Sec. 123.6(c)(1). Similarly, for juice we could
propose to add ``economically motivated adulteration that could result
in serious adverse health consequences or death'' to the list of
hazards to be considered in a hazard analysis in accordance with Sec.
120.7(c). Also under this option, FDA would consider proposing to amend
part 111 (21 CFR part 111), the Dietary Supplements current good
manufacturing practice (CGMP) rule, to include economically motivated
adulteration that could result in serious adverse health consequences
or death. Current Sec. 111.70(b) and (c) require establishing
component specifications and in-process specifications to ensure the
identity, purity, strength, and composition of the dietary supplement,
and we could amend these provisions to cover economically motivated
adulteration that could result in serious adverse health consequences
or death.
We have also tentatively concluded not to require produce farms
subject to section 419 of the FD&C Act and farms that produce milk
(also referred to in this document as ``dairy farms'') subject to
section 420 of the FD&C Act to take measures to address economically
motivated adulteration. With regard to produce farms subject to section
419 of the FD&C Act, we have tentatively concluded that there are not
procedures, processes, or practices that are reasonably necessary to be
implemented by these entities to prevent the introduction of known or
reasonably foreseeable biological, chemical, or physical hazards that
can cause serious adverse health consequences or death as a result of
economically motivated adulteration. With regard to farms that produce
milk subject to section 420 of the FD&C Act, we have tentatively
concluded that there are not appropriate science-based strategies or
measures intended to protect against economically motivated
adulteration that can be applied at the farm. These tentative
conclusions are based on our assessment that preventive controls for
economically motivated adulteration are suitable to address such
adulteration when it is perpetrated by the entity's supplier, but not
when it is perpetrated by the entity itself, as would be the case for
economically motivated adulteration at a produce farm or a farm that
produces milk. Actions such as auditing of suppliers or reliance upon
supplier-supplied test results or production control records are
generally considered unsuitable to address economically motivated
adulteration where the supplier, if intentionally adulterating the
food, would already be violating the law and would be able to subvert
these controls. For both types of farms, we are not aware of inputs
into the growing, harvesting, packing, or holding of produce or milk
(i.e., within our farm definition) that could be subject to
economically motivated adulteration that could cause serious adverse
health consequences or death under sections 419 and 420 of the FD&C
Act. We seek comment on this tentative conclusion.
[[Page 78029]]
G. Low-Risk Activities at Farm Mixed-Type Facilities
Section 103(c)(1)(C) of FSMA directs the Secretary of Health and
Human Services to conduct a science-based risk analysis as part of the
section 103(c) rulemaking. The science-based risk analysis is to cover
``(i) specific types of on-farm packing or holding of food that is not
grown, raised, or consumed on such farm or another farm under the same
ownership, as such packing and holding relates to specific foods; and
(ii) specific on-farm manufacturing and processing activities as such
activities relate to specific foods that are not consumed on that farm
or on another farm under common ownership.'' In section VIII.G of the
PC proposed rule, we describe a draft Qualitative Risk Assessment (the
draft RA) we performed to satisfy this requirement. Section
103(c)(1)(D)(i) of FSMA requires FDA to use the results of this
analysis to establish exemptions and inspection frequencies, or modify
requirements, for facilities engaged only in specific types of on-farm
activities that FDA determines to be low risk.
Elsewhere in this issue of the Federal Register, FDA is publishing
a notice announcing the availability for public comment Appendix 4 to
the draft RA (the draft RA Appendix). The purpose of the draft RA
Appendix is to provide a science-based risk analysis of those foods
whose production processes would be considered low risk with respect to
the risk of intentional adulteration caused by acts of terrorism. FDA
conducted this evaluation to satisfy the requirement in Section
103(c)(1)(C) of FSMA to conduct a science-based risk analysis with
respect to the risk of intentional adulteration caused by acts of
terrorism. We evaluated the production processes for the types of
finished foods we expect are produced at farm mixed-type facilities to
determine whether or not they are low-risk with respect to hazards that
may be intentionally introduced by acts of terrorism. For the purposes
of this analysis, we evaluated whether a production process involved
any of the four FDA-identified key activity types, and identified a
production process that did not involve any of the four key activity
types as a ``low risk production process.'' Based on this evaluation,
we concluded that the production processes for the following finished
foods are ``low-risk'':
Eggs (In-Shell)
Fruits & Vegetables Other Than Pods, Seeds for Direct
Consumption, and Hesperidia (Fresh, Intact)
Game Meats (Whole or Cut, Not Ground or Shredded, Without
Secondary Ingredients)
Peanuts & Tree Nuts (Raw, In-Shell)
Sugarcane & Sugar Beets (Fresh, Intact)
We are considering the results of this analysis in determining any
specific exemptions or modified requirements. We request comment on
whether we should exempt on-farm manufacturing, processing, packing, or
holding of the foods identified as having low-risk production practices
when conducted by a small or very small business if such activities are
the only activities conducted by the business that are subject to
section 418 of the FD&C Act. If we were to take this approach, only
facilities meeting all of the specified criteria would be exempt as a
result of being engaged in low-risk activities. Thus, a facility
located on-farm, that is a small or very small business, and only
produces fresh, intact apples as a finished product (e.g., by packing
apples grown on a different farm that is under different ownership)
would be exempt from this proposed rule. On the other hand, an apple-
packing facility that is off-farm would not be exempt, an apple packing
facility that is on-farm but that is not a small or very small business
would not be exempt, and an apple packing facility that also packs
green beans would not be exempt. We request comment on whether we
should broaden this potential exemption in any way, such as by removing
certain of the restrictions mentioned immediately above. We also seek
comment on whether we should instead establish modified requirements
for facilities that produce foods identified as having low-risk
production processes, and if so, what those modified requirements
should be and the scope of application of the modified requirements. In
addition, we seek comment on whether and how we should consider the
results of this analysis in determining whether to exempt or modify the
inspections frequency requirements under Section 421 of the FD&C Act,
Targeting of Inspection Resources for Domestic Facilities.
H. Activities That Occur on Dairy Farms
1. Assessment of Vulnerabilities
Under section 420 of the FD&C Act, we considered whether activities
that occur on farms that produce milk pose a high risk for intentional
adulteration of food caused by acts of terrorism that could cause
significant adverse health consequences or death. A preliminary
evaluation indicates that fluid milk storage appears to fit within the
key activity type, Liquid storage and handling, and fluid milk loading
appears to fit within the key activity type, Bulk liquid receiving and
holding. The fluid milk storage tank is one of the actionable process
steps that would be applicable to both of these activities on a dairy
farm.
As discussed in section V.C.2 of this document, FDA is proposing to
require that the owner, operator, or agent in charge of a facility that
has one or more of the FDA-identified key activity types identify
actionable process steps for those key activity types and implement
focused mitigation strategies at any actionable process steps. Because
dairy farms generally are not facilities as defined in this rule, they
would not be subject to this requirement. However, section 420 is
applicable to dairy farms (see Sec. 420(d)) and fluid milk storage and
loading in a dairy farm operation appear to pose a significant
vulnerability.
The risk posed by intentional adulteration of milk on-farm results
from a number of factors: (1) The system of milk collection from farms
and subsequent holding and processing serves to distribute contaminants
added to the milk on the farm into much larger quantities of fluid
milk, increasing the potential magnitude of an intentional adulteration
event; (2) in its fluid form milk has a short shelf life, increasing
the potential for significant adverse public health impacts before
detection and, once detected, before a public health intervention can
be implemented; (3) fluid milk is widely consumed across different sub-
populations, including infants and children, increasing the potential
for significant adverse public health impacts and, because of public
reaction to child and infant morbidity and mortality, decreasing public
confidence in the food supply; (4) fluid milk is consumed in a variety
of food forms, including as a beverage (finished food) and as an
ingredient in other finished foods, complicating public health
intervention; and (5) milk storage tanks are commonly left unlocked
(Ref. 41, Ref. 42, Ref. 43, Ref. 44, Ref. 45, Ref. 46, Ref. 47).
2. Mitigation Strategies
Farms are not subject to the HACCP-type system of preventive
controls prescribed in section 418 of the FD&C Act, and our current
thinking is that, should we include requirements relative to dairy
farms in the final rule, we would not require HACCP-type controls for
dairy farms under section 420 of the FD&C Act. Similarly, under section
419 of the FD&C Act we did not propose to apply such an approach to
unintentional adulteration on produce
[[Page 78030]]
farms in the Produce Safety proposed rule (see section IV.D of the
Produce Safety proposed rule). Rather, as with produce farms, a more
appropriate approach might be a CGMP-type provision that relates
directly to the significant vulnerability. Generally, CGMPs set out
mandatory, broad, generally applicable practices and conditions that
are required to be met, and the criteria and definitions that are
applicable in determining whether the food is adulterated. For example,
a CGMP approach would identify the broad, generally applicable
mitigation strategies that dairy farm operators must implement (e.g.,
limiting access to fluid milk storage tanks), without specifying how
that strategy must be accomplished and without a further requirement
for monitoring, recordkeeping or the development of a plan. We seek
comment on this approach.
FDA previously provided guidance for the dairy industry, including
dairy farms, on the potential for intentional contamination and
identified the types of food defense measures that dairy farms may take
to minimize the risk that fluid milk under their control will be
subject to tampering or other malicious, criminal, or terrorist actions
(Ref. 24). Among other recommendations, FDA's guidance recommends
``limiting access'' to raw and pasteurized milk storage as a food
defense preventive measure. We acknowledge the difficulties involved in
limiting access to many dairy farms, including multiple entries to the
milk house, multiple visitors with customary access to the milk house
(e.g., State food safety inspectors, vendors delivering veterinary
medications, and drivers collecting bulk milk for transport to
processing and storage facilities); continuous milk piping from the
milking parlor to the bulk milk tank, providing for access points to
the bulk milk tank from outside the milk house; open access to the
milking parlor for workers and cows; and automated milking operations
where employees are not necessarily present to escort cows into the
milking parlor.
In light of these circumstances, we request comment on whether and
how access to the bulk milk storage tank and associated systems can be
limited, and the costs and other implications of doing so. In addition,
we are interested in comment on whether and what types of focused
mitigation strategies or other measures are currently employed by dairy
farms. Specifically for fluid milk storage tanks, we seek comment on
whether and what focused mitigation strategies would be appropriate and
feasible given current dairy farming practices.
We also seek comment on whether it would be more appropriate for
FDA to require that dairy farm operators receive food defense awareness
training rather than requiring that they implement focused mitigation
strategies to limit access to certain steps of their operation. If you
support an approach based on training rather than mandated focused
mitigation strategies, we are further interested in how such an
approach would work at those farms where an agent of the farm may not
be present at all times, given that a system based on awareness
training is premised on the assumption that such training would provide
the operator with the tools to report and respond to suspicious
activity that they observe.
3. Scope of Dairy Farms Subject to any Requirement
Finally, we seek comment on the scope of farms that produce milk
that should be subject to any requirements that we may establish in a
final rule. For example, the scope of dairy farms covered could be
determined based on the potential for adverse public health outcome
resulting from consumption of milk produced at a farm, if a contaminant
were intentionally introduced into the milk from that farm. Farms with
less than 50 milk-producing cows contribute a relatively small
proportion to the total volume of milk produced in the United States
(i.e., approximately 4.2 percent of total milk produced in the United
States), and the current trend in the dairy farm industry toward
consolidation (Ref. 48) likely further reduces the percentage of
production that such farms will contribute in the future. However, milk
from even very small dairy farms may be pooled with milk from other
farms in raw milk storage tanks at milk processing and storage
facilities, potentially resulting in a public health impact from
intentional adulteration that is disproportionate to the size of the
farm or its contribution to the milk supply. We request comment on the
appropriateness of determining the scope of dairy farms covered based
on the number of cows on a farm. Alternatively, should we consider
excluding farms based on how the milk from a farm is distributed (e.g.,
direct sale to consumers or other end users; pooling with milk from
other farms; supplied to the Grade A Milk system for the production of
fluid milk; or used in the production of cheese and other products that
have a different risk associated with intentional adulteration caused
by acts of terrorism)?
I. Other Ways to Focus on Foods With a High Risk of Intentional
Adulteration Caused by Terrorism
We are requesting comment on whether, under section 420 of the FD&C
Act, there are other ways in which the coverage of this proposed
regulation can be further focused on foods that present a high risk of
intentional adulteration caused by acts of terrorism. For example, are
there ways in which a food's shelf life, turnover in the marketplace,
batch size, serving size and servings per batch, distribution and
consumption patterns, and intended consumer could be considered in
providing for an exemption or in setting modified requirements for that
food. Ordinarily, these considerations are part of a vulnerability
assessment, and in such assessments the risk reduction aspects of one
attribute may be offset or exacerbated by those of another attribute,
and may be very facility-specific. Such attributes specific to the
food(s) manufactured, processed, packed, or held at the facility can be
taken into account, should a facility choose to perform its own
vulnerability assessment and assign actionable process steps, as
provided for in proposed Sec. 121.130(b). However, as discussed in
section V.C.2 of this document, facilities would not be required to
perform a facility-specific vulnerability assessment and, instead,
would have the option of identifying actionable process steps using the
procedure in proposed Sec. 121.130(a). We are particularly interested
in how food-specific attributes can be taken into account in the
absence of a general requirement for a facility-specific vulnerability
assessment.
V. The Proposal
A. Definitions
In subpart A of proposed part 121, under Sec. 121.3, FDA is
proposing the following definitions and interpretations of terms
relevant to proposed part 121. The definitions and interpretations of
terms in section 201 of the FD&C Act (21 U.S.C. 321) are applicable to
such terms when used in this part. As proposed, several terms in part
121 have the same definitions as in proposed part 117 and, therefore,
we have not included an extensive discussion of those terms in this
proposed rule. See section X.B of the PC proposed rule for a discussion
of the following terms: facility, farm, holding, manufacturing/
processing, mixed-type facility, packing, qualified end-user, qualified
facility, and small business.
FDA is proposing to define the term ``actionable process step'' to
mean a
[[Page 78031]]
point, step, or procedure in a food process at which food defense
measures can be applied and are essential to prevent or eliminate a
significant vulnerability or reduce such vulnerability to an acceptable
level. The term ``actionable process step'' used in the food defense
context is analogous to the term ``critical control point'' (CCP),
which is defined as ``a point, step, or procedure in a food process at
which control can be applied and is essential to prevent or eliminate a
food safety hazard or reduce such hazard to an acceptable level.''
Similar to a CCP, in proposed part 121, an ``actionable process step''
is identified during a vulnerability assessment (analogous to a hazard
analysis) in relation to a significant vulnerability (analogous to a
hazard that is reasonably likely to occur), and is facility-specific.
As discussed in section V.C.2 of this document, based on
vulnerability assessments, FDA has identified four key activity types
that we have tentatively concluded pose significant vulnerabilities in
a food operation. FDA identified and described these key activity types
(which are not facility-specific) with the expectation that an owner,
operator, or agent in charge would objectively determine whether the
processing steps in a facility fit within one or more of these key
activity types. The processing steps identified by facilities in their
food operation that fit within the FDA-identified key activity types
are ``actionable process steps,'' and are steps at which a focused
mitigation strategy would be employed to prevent or eliminate a
significant vulnerability or reduce it to an acceptable level.
Actionable process steps might also be identified in a vulnerability
assessment (proposed Sec. 121.130(b)). Though we use the term
``actionable process step'' in FDA's FDPB software tool (Ref. 31), we
recognize it is a relatively new term and, therefore, we solicit
comment on its appropriateness and any other more appropriate
alternative terms.
FDA is proposing to define the term ``contaminant'' as any
biological, chemical, physical or radiological agent that may be
intentionally added to food and that may cause illness, injury or
death. We based the proposed definition, in part, on the definition of
``contaminant'' used in Codex Alimentarius guidelines (Ref. 49) that
refers to any biological or chemical agent, foreign matter or other
substances not intentionally added to feed or food that may compromise
feed and food safety or suitability. In this proposal, the term
``contaminant'' is used in the context of key activity types, which are
related to intentional acts of adulteration caused by acts of terrorism
with intent to cause public health harm and, to a lesser extent,
economic disruption. Therefore, for the purposes of proposed part 121,
we focused the definition of ``contaminant'' on agents that may be
intentionally added to food and that may cause illness, injury, or
death, which is consistent with our determination that the primary goal
of such an attack would be public health harm (i.e., illness, injury,
or death). Our proposed definition of ``contaminant'' in proposed 121.3
would be applicable to proposed part 121 only. We acknowledge that this
term has a broader meaning in other settings, as evidenced by its use
in the Codex Alimentarius guidelines.
FDA is proposing to define the term ``facility'' to mean a domestic
facility or a foreign facility that is required to register under
section 415 of the FD&C Act in accordance with the requirements of part
1, subpart H (21 CFR part 1, subpart H). The proposed definition would
incorporate the definition in section 418(o)(2) of the FD&C Act.
FDA is proposing to define the term ``farm'' by reference to the
definition of that term in proposed Sec. 1.227. We are proposing to
cross-reference the definition of ``farm'' rather than to define it in
proposed part 121 because the definition of ``farm,'' under both
current Sec. 1.227(b)(3) and proposed Sec. 1.227, includes the word
``facility'' with a meaning that is broader than the meaning of
``facility'' in section 418(o)(2) of the FD&C Act. Under part 1,
subpart H, the term ``facility'' is not limited to entities that are
required to register under section 415 of the FD&C Act. We are
proposing to cross-reference the definition to reduce the potential
confusion that could result if we used the term ``facility'' to have
two different meanings within proposed part 121. See sections X.B and
VIII of the PC proposed rule for additional information.
FDA is proposing to define the term ``focused mitigation
strategies'' to mean those risk-based, reasonably appropriate measures
that a person knowledgeable about food defense would employ to
significantly minimize or prevent significant vulnerabilities
identified at actionable process steps, and that are consistent with
the current scientific understanding of food defense at the time of the
analysis. The term ``focused mitigation strategies'' used in the food
defense context is analogous to the term ``preventive controls'' in a
HACCP-type framework for food safety.
As discussed in section V.C.3 of this document, a mitigation
strategy is a measure taken by a facility to reduce the potential for
intentional adulteration of food. A ``focused mitigation strategy'' is
such a strategy applied in response to the identification of a
significant vulnerability and at an actionable process step. Focused
mitigation strategies are customized to the processing step at which
they are applied, tailored to existing facility practices and
procedures, and depend on an evaluation of the vulnerabilities
identified in a facility. Because they are applied in response to a
significant vulnerability, we have determined that focused mitigation
strategies are essential to ensure that appropriate action is taken to
protect the food from intentional adulteration caused by acts of
terrorism.
While an option to perform a vulnerability assessment is provided
under proposed Sec. 121.130(b), facilities may choose instead to rely
on the analysis performed by FDA that resulted in the identification of
the key activity types listed in proposed Sec. 121.130(a) when
identifying actionable process steps and, subsequently, focused
mitigation strategies, eliminating the need for a full vulnerability
assessment. See section V.C.3 of this document for examples of focused
mitigation strategies.
FDA is proposing to define the term ``food defense'' as the effort
to protect food from intentional acts of adulteration where there is an
intent to cause public health harm and economic disruption. As
discussed in section IV.A of this document, acts of intentional
adulteration may take several forms, including acts of terrorism; acts
of disgruntled employees, consumers, or competitors; and economically
motivated adulteration. We are proposing to define the term ``food
defense'' to refer to the sum of actions and activities (including
identification of actionable process steps; implementation of focused
mitigation strategies; monitoring, corrective actions, verification,
and training activities) taken to protect food from intentional acts of
adulteration related to terrorism.
FDA is proposing to define the term ``holding'' to mean the storage
of food. The proposed definition would also state that holding
facilities include warehouses, cold storage facilities, storage silos,
grain elevators, and liquid storage tanks; and that, for farms and farm
mixed-type facilities, holding also includes activities traditionally
performed by farms for the safe or effective storage of raw
agricultural commodities grown or raised on the same farm or another
farm under the
[[Page 78032]]
same ownership, but does not include activities that transform a raw
agricultural commodity, as defined in section 201(r) of the FD&C Act,
into a processed food as defined in section 201(gg) of the FD&C Act.
For consistency of terminology, we are proposing the same definition of
``holding'' as in the PC proposed rule (see proposed Sec. Sec. 1.227
and 117.3). For a detailed discussion of ``holding,'' see sections
VIII.E and X.B of the PC proposed rule.
FDA is proposing to define the term ``manufacturing/processing'' to
mean making food from one or more ingredients, or synthesizing,
preparing, treating, modifying or manipulating food, including food
crops or ingredients. The proposed definition would also state that
examples of manufacturing/processing activities are cutting, peeling,
trimming, washing, waxing, eviscerating, rendering, cooking, baking,
freezing, cooling, pasteurizing, homogenizing, mixing, formulating,
bottling, milling, grinding, extracting juice, distilling, labeling, or
packaging. The proposed definition would also specify that, for farms
and farm mixed-type facilities, manufacturing/processing does not
include activities that are part of harvesting, packing, or holding.
For consistency of terminology, we are proposing the same definition of
``manufacturing/processing'' as in the PC proposed rule (see proposed
Sec. Sec. 1.227 and 117.3). For a detailed discussion of
``manufacturing/processing,'' see sections VIII.E and X.B of the PC
proposed rule.
FDA is proposing to define the term ``mixed-type facility'' to mean
an establishment that engages in both activities that are exempt from
registration under section 415 of the FD&C Act and activities that
require the establishment to be registered. The proposed definition
would also state that an example of such a facility is a ``farm mixed-
type facility,'' which is an establishment that grows and harvests
crops or raises animals and may conduct other activities within the
farm definition, but also conducts activities that require the
establishment to be registered. For consistency of terminology, we are
proposing the same definition of ``mixed-type facility'' as in the PC
proposed rule (see proposed Sec. Sec. 1.227 and 117.3). For a detailed
discussion of ``mixed-type facilities,'' see sections VIII.E and X.B of
the PC proposed rule.
FDA is proposing to define the term ``monitor'' to mean to conduct
a planned sequence of observations or measurements to assess whether
focused mitigation strategies are consistently applied and to produce
an accurate record for use in verification. In the intentional
adulteration framework, monitoring would be performed to ensure that
focused mitigation strategies are consistently applied and to provide a
record for use in verifying consistent application.
FDA is proposing to define the term ``packing'' to mean placing
food into a container other than packaging the food. The proposed
definition would also specify that, for farms and farm mixed-type
facilities, packing also includes activities traditionally performed by
farms to prepare raw agricultural commodities grown or raised on the
same farm or another farm under the same ownership for storage and
transport, but does not include activities that transform a raw
agricultural commodity, as defined in section 201(r) of the FD&C Act,
into a processed food as defined in section 201(gg). We are proposing
to use the same definition of ``packing'' as in the PC proposed rule
(see proposed Sec. Sec. 1.227 and 117.3). For a detailed discussion of
``packing,'' see sections VIII.E and X.B of the PC proposed rule.
FDA is proposing to define the term ``qualified end-user'' to mean,
with respect to a food, the consumer of the food (where the term
consumer does not include a business); or a restaurant or retail food
establishment (as those terms are defined in Sec. 1.227) that: (1) Is
located: (i) in the same State as the qualified facility that sold the
food to such restaurant or establishment; or (ii) not more than 275
miles from such facility; and (2) is purchasing the food for sale
directly to consumers at such restaurant or retail food establishment.
The proposed definition would incorporate the definition in section
418(l)(4)(B) of the FD&C Act.
FDA is proposing to define the term ``qualified facility'' to mean
(when including the sales by any subsidiary; affiliate; or subsidiaries
or affiliates, collectively, of any entity of which the facility is a
subsidiary or affiliate) a facility that is: (1) A very small business
as defined in this part; or (2) a facility to which both of the
following apply: (i) During the 3-year period preceding the applicable
calendar year, the average annual monetary value of the food
manufactured, processed, packed or held at such facility that is sold
directly to qualified end-users (as defined in this part) during such
period exceeded the average annual monetary value of the food sold by
such facility to all other purchasers; and (ii) the average annual
monetary value of all food sold during the 3-year period preceding the
applicable calendar year was less than $500,000, adjusted for
inflation.
We acknowledge that facilities would not need to consider the
applicability of previous paragraph (2) because facilities that meet
this second prong of the definition would be included in our proposed
definition of a very small business, which is broader.
The proposed definition would incorporate the description of
``qualified facility'' in section 418(l)(1) of the FD&C Act with
editorial changes to improve clarity.
FDA is proposing to define the term ``significant vulnerability''
to mean a vulnerability for which a prudent person knowledgeable about
food defense would employ food defense measures because of the
potential for serious adverse health consequences or death and the
degree of accessibility to that point in the food process. The term
``significant vulnerability'' is analogous to the term ``hazard that is
reasonably likely to occur'' in a HACCP-type framework for food safety.
As proposed, a ``significant vulnerability'' is a type of vulnerability
for which there is both: (1) The potential for serious adverse health
consequences or death from the intentional introduction of a
contaminant at the particular point in the process at which the
significant vulnerability exists; and (2) a significant degree of
accessibility at the particular point in the process. Unlike a ``hazard
that is reasonably likely to occur'' in a HACCP system, a ``significant
vulnerability'' exists at a particular point in a process (e.g., during
storage in a bulk tank or during mixing). As discussed in section V.C.2
of this document, we have determined that significant vulnerabilities
exist in a food operation at those actionable process steps that fit in
the FDA-identified key activity types or that are identified as part of
a vulnerability assessment.
We have retained in this proposed definition the concept of a
``prudent person'' used in the definition of a ``hazard that is
reasonably likely to occur'' in the PC proposed rule. However, because
intentional adulteration is a potentially high consequence but low
probability occurrence, the portion of the proposed definition in the
PC proposed rule that reads, ``experience, illness data, scientific
reports, or other information provides a basis to conclude that there
is a reasonable possibility that the hazard will occur in the type of
food being manufactured, processed, packed, or held in the absence of
those controls,'' does not appear to be appropriate. Successful
intentional adulteration caused by an act of
[[Page 78033]]
terrorism requires not only the absence of focused mitigation
strategies designed to address a significant vulnerability, but also
simultaneous intent by an attacker to adulterate the food. As such, the
absence of focused mitigation strategies to address a significant
vulnerability alone may not present a reasonable possibility of
intentional adulteration. Instead, as described above, we have
tentatively concluded that the prudent person would consider the
potential for public health consequences should intentional
adulteration occur, and the degree of access by the attacker to commit
the intentional adulteration, in determining which vulnerabilities are
significant.
FDA is proposing to define the term ``significantly minimize'' to
mean to reduce to an acceptable level, including to eliminate. As noted
in section X.B of the PC proposed rule, the term ``significantly
minimize'' is used in FSMA and is consistent with the outcome of a
``control measure'' as described in the HACCP regulations for seafood
(part 123), juice (part 120), and meat and poultry (9 CFR part 417).
Generally, a ``control measure'' is implemented so that hazards are
prevented, reduced to an acceptable level, or eliminated.
FDA is proposing to define the term ``small business'' to mean, for
the purposes of proposed part 121, a business employing fewer than 500
persons. The proposed limit of 500 employees would include all
employees of the business rather than be limited to the employees of a
particular facility. We are proposing to establish the same definition
for small business as that which has been established by the U.S. Small
Business Administration under 13 CFR part 121 for most food
manufacturers.
FDA is proposing to define the term ``verification'' to mean those
activities, other than monitoring, that establish that the system is
operating according to the food defense plan. As discussed in section
V.C.6 of this document, we are not proposing to require validation of
the focused mitigation strategies and, therefore, we are not proposing
to include a determination of the validity of the food defense plan
within the definition of verification in proposed Sec. 121.3.
FDA is proposing to define the term ``very small business'' to
mean, for the purposes of proposed part 121, a business that has less
than $10,000,000 in total annual sales of food, adjusted for inflation.
In the discussion on the regulatory framework in section IV.A of this
document, we discuss our assessment that the goal of terrorist
organizations is to maximize public health harm and, to a lesser
extent, economic disruption. It is our assessment that such goals are
likely to drive terrorist organizations to target the product of
relatively large facilities, especially those for which the brand is
nationally or internationally recognizable. An attack on such a target
would potentially provide the wide-scale consequences desired by a
terrorist organization and the significant public attention that would
accompany an attack on a recognizable brand. Such facilities are likely
to have larger batch sizes, potentially resulting in greater human
morbidity and mortality. Further, an attack on a well-recognized,
trusted brand is likely to result in greater loss of consumer
confidence in the food supply and in the government's ability to ensure
its safety and, consequently, cause greater economic disruption than a
relatively unknown brand that is distributed regionally (Ref. 2, Ref.
50, Ref. 3, Ref. 51, Ref. 6). Therefore, we have set a threshold of
$10,000,000 in total food sales, adjusted for inflation, as the level
defining a very small business. Data from the Dun & Bradstreet Global
Business Database show that businesses with less than $10,000,000 in
total food sales represent about 3 percent of the market share of food
commodities, but include the majority of food facilities. Of a total of
65,900 domestic food facilities that are estimated to have actionable
process steps, about 51,700 are owned by businesses with less than
$10,000,000 in total annual sales. We request comment on our proposed
definition, and whether a dollar amount of sales more than or less than
$10,000,000 would be more appropriate. We also seek comment on whether
this threshold should be based on total food sold, as we proposed, or
on some appropriate proportion of food sales. For example, in the case
of foreign facilities, would it be more appropriate to consider the
proportion of food sold for marketing in the United States?
FDA is proposing to define the term ``vulnerability'' to mean the
susceptibility of a point, step, or procedure in a facility's food
process to intentional adulteration. ``Vulnerability'' is used in the
term ``vulnerability assessment'' in section 420 of the FD&C Act and
may best be described in the food defense context as analogous to the
term ``hazard'' in a HACCP-type framework for food safety. While
hazards in the unintentional adulteration context may also be thought
of as analogous to agents or contaminants in the intentional
adulteration context, we have tentatively concluded that focusing on
individual agents or contaminants is generally not effective or
efficient in minimizing the risk of intentional adulteration caused by
acts of terrorism. There are a significant number of potential agents
or contaminants that could be used in a terrorist attack on food, with
one or more being suitable for essentially any point in the production
of any specific food. It would be extremely difficult, if not
impossible, to consider the multiple combinations of potential
contaminants, points in a food operation, and food categories, and to
determine a strategy that would effectively address all possible
agents. For this reason, determining whether there is an agent that
could be intentionally introduced to a specific food that would then
cause serious adverse health consequences or death would not be a
useful exercise. Further, many agents or contaminants that could be
used in such an attack are different from those that are associated
with foodborne illnesses caused by unintentional adulteration and, as
such, are not expected to be well understood by operators of food
facilities. Therefore, we have tentatively concluded that in the
intentional adulteration framework related to acts of terrorism, it is
appropriate to refer to ``vulnerabilities'' rather than ``hazards''.
According to the Merriam-Webster dictionary (Ref. 52), vulnerability is
a ``susceptibility,'' and we believe this concept best captures the
idea of a point, step, or procedure where someone intent on intentional
adulteration would focus an attack in a facility's food process. See
section V.C.2 of this document for a discussion of assessing
vulnerabilities to identify actionable process steps.
We solicit comment on the proposed definitions.
B. Exemptions
In subpart A of proposed part 121, proposed Sec. 121.5 would
establish exemptions from some or all of the provisions of this
proposed regulation.
1. Proposed Sec. 121.5(a)--Exemption for Qualified Facilities
Proposed Sec. 121.5(a) would provide that proposed part 121 does
not apply to a qualified facility, except that qualified facilities
must, upon request, provide for official review documentation that was
relied upon to demonstrate that the facility meets this exemption. Such
documentation must be retained for 2 years.
a. Exemption of qualified facilities. As discussed in section V.A
of this document, proposed Sec. 121.3 would
[[Page 78034]]
define a qualified facility to mean (when including the sales by any
subsidiary; affiliate; or subsidiaries or affiliates, collectively, of
any entity of which the facility is a subsidiary or affiliate) a
facility that is: (1) A very small business as defined in this part, or
(2) a facility to which both of the following apply: (i) During the 3-
year period preceding the applicable calendar year, the average annual
monetary value of the food manufactured, processed, packed or held at
such facility that is sold directly to qualified end-users (as defined
in this part) during such period exceeded the average annual monetary
value of the food sold by such facility to all other purchasers; and
(ii) the average annual monetary value of all food sold during the 3-
year period preceding the applicable calendar year was less than
$500,000, adjusted for inflation. In addition, we are proposing to
define very small business to mean a business that has less than
$10,000,000 in total annual sales of food, adjusted for inflation.
Section 418(l)(2)(A) of the FD&C Act provides that a qualified
facility ``shall not be subject to the requirements under [sections
418(a) through (i) and (n) of the FD&C Act].'' We have tentatively
concluded that we should include the exemption provided in section
418(l)(2)(A) of the FD&C Act in proposed Sec. 121.5(a) to establish by
regulation the reach of the provision.
Section 418(l)(5) of the FD&C Act requires the Secretary of Health
and Human Services, in consultation with the Secretary of Agriculture,
to conduct a study of the food processing sector regulated by the
Secretary of Health and Human Services and to make determinations in
five areas. These areas include, in part: (1) Distribution of food
production by type and size of operation; (2) the proportion of food
produced by each type and size of operation; (3) the number and types
of food facilities co-located on farms; (4) the incidence of foodborne
illness originating from each size and type of operation; and (5) the
effect on foodborne illness risk associated with certain activities
regarding food.
Section 418(n)(1)(B) of the FD&C Act requires that the regulations
define the terms ``small business'' and ``very small business,'' taking
into consideration the study of the food processing sector required by
section 418(l)(5) of the FD&C Act. Consistent with section 418(l)(5) of
the FD&C Act, we have consulted with USDA during our study of the food
processing sector. The study is available in the docket established for
this proposed rule (Ref. 53). We request comment on that study. We will
consider comments regarding the study, as well as comments regarding
our proposed definition for very small business, in any final rule
based on this proposed rule.
We note that section 420 of the FD&C Act does not contain an
explicit size-based exemption, such as the qualified facility provision
in section 418 of the FD&C Act. In section IV.A of this document, we
discuss our assessment that the goal of terrorist organizations is to
maximize public health harm and, to a lesser extent, economic
disruption. We have tentatively concluded that such goals are likely to
drive terrorist organizations to target the product of relatively large
facilities, especially those for which the brand is nationally or
internationally recognizable. The regulations issued under section 420
of the FD&C Act are to apply to food for which there is a high risk of
intentional contamination. We have tentatively concluded that
designating businesses with less than $10,000,000 in total annual sales
of food as very small businesses, resulting in their exemption from
proposed part 121, is consistent with the requirement in section 420 of
the FD&C Act that the regulation be limited to foods at high risk of
intentional adulteration.
We acknowledge that the amount of food sales in the proposed
definition of very small business (total annual sales of food of less
than $10,000,000) is significantly higher than the threshold in the PC
proposed rule, in which we co-proposed three amounts ($250,000,
$500,000, and $1,000,000 in total annual sales of food). The higher
amount proposed here reflects the difference in the nature of risk
related to intentional adulteration covered by this rule and is
consistent with the requirement in section 418(n)(3)(C) of the FD&C Act
that this regulation ``acknowledge differences in risk and minimize, as
appropriate, the number of separate standards that apply to separate
foods.''
There are some facilities that are not subject to section 418 of
the FD&C Act but are subject to section 420 of the FD&C Act, and would
be subject to this rulemaking because their activities would likely
involve one of the key activity types (e.g., juice manufacturing and
breaded seafood manufacturing). However, under proposed Sec. 121.5(a),
such facilities would be exempt from proposed part 121 if they are part
of businesses with less than $10,000,000 in total annual sales of food,
adjusted for inflation.
b. Documentation requirement for qualified facilities. Sections
418(l)(2)(A) and (l)(2)(B) of the FD&C Act provide that a qualified
facility is exempt from the requirements of sections 418(a) through (i)
and (n) (i.e., the requirements for hazard analysis and risk-based
preventive controls), but must instead submit two types of
documentation to the Secretary of Health and Human Services. The first
type of required documentation relates to food safety practices at the
facility, and section 418(l)(2)(B)(i) of the FD&C Act provides two
options for satisfying this documentation requirement. Under section
418(l)(2)(B)(i)(I) of the FD&C Act, the qualified facility may choose
to submit documentation that demonstrates that the owner, operator, or
agent in charge of the facility has identified potential hazards
associated with the food being produced, is implementing preventive
controls to address the hazards, and is monitoring the preventive
controls to ensure that such controls are effective. Alternatively,
under section 418(l)(2)(B)(i)(II) of the FD&C Act, the qualified
facility may choose to submit documentation (which may include
licenses, inspection reports, certificates, permits, credentials,
certification by an appropriate agency (such as a State department of
agriculture), or other evidence of oversight), as specified by the
Secretary of Health and Human Services, that the facility is in
compliance with State, local, county, or other applicable non-Federal
food safety law.
The second type of required documentation relates to whether the
facility satisfies the definition of a qualified facility. Under
section 418(l)(2)(B)(ii) of the FD&C Act, the facility must submit
documentation, as specified by the Secretary of Health and Human
Services in a guidance document, that the facility is a qualified
facility under section 418(l)(1)(B) or section 418(l)(1)(C).
Section 418(l)(7)(A) of the FD&C Act requires that a qualified
facility that is exempt from the requirements under sections 418(a)
through (i) and subsection (n), and that does not prepare documentation
under section 418(l)(2)(B)(i)(I), provide notification to consumers by
one of two procedures, depending on whether a food packaging label is
required on the food. With respect to a food for which a food packaging
label is required by the Secretary of Health and Human Services under
any other provision of the FD&C Act, section 418(l)(7)(A)(i) of the
FD&C Act requires that a qualified facility include prominently and
conspicuously on such label the name and business address of the
facility where the food was manufactured or processed. With
[[Page 78035]]
respect to a food for which a food packaging label is not required by
the Secretary of Health and Human Services under any other provisions
of the FD&C Act, section 418(l)(7)(A)(ii) of the FD&C Act requires that
a qualified facility prominently and conspicuously display, at the
point of purchase, the name and business address of the facility where
the food was manufactured or processed, on a label, poster, sign,
placard, or documents delivered contemporaneously with the food in the
normal course of business, or, in the case of Internet sales, in an
electronic notice.
Section XIII.A of the PC proposed rule describes our proposed
requirements pursuant to the above described modified requirements for
qualified facilities in that proposed rule. In summary, in the PC
proposed rule, we proposed codified language to require submission of
the following to FDA: (1) Documentation that the facility is a
qualified facility; and (2) documentation that demonstrates that the
owner, operator, or agent in charge of the facility has identified the
potential hazards associated with the food being produced, is
implementing preventive controls to address the hazards, and is
monitoring the performance of the preventive controls to ensure that
such controls are effective; or documentation (which may include
licenses, inspection reports, certificates, permits, credentials,
certification by an appropriate agency (such as a State department of
agriculture), or other evidence of oversight) that the facility is in
compliance with State, local, county, or other applicable non-Federal
food safety law, including relevant laws and regulations of foreign
countries. In Section XIII.A of the PC proposed rule, we clarified that
the following submission of information would be satisfactory: (1) A
statement from the owner, operator, or agent in charge of a qualified
facility certifying that the facility is a very small business,
otherwise meets the definition of a qualified facility under proposed
Sec. 117.3, or both; and (2) a statement from the owner, operator, or
agent in charge of a qualified facility certifying that the facility
(a) has identified the potential hazards associated with the food being
produced, is implementing preventive controls to address the hazards,
and is monitoring the implementation of the preventive controls to
ensure that such controls are effective; or (b) is in compliance with
State, local, county, or other applicable non-Federal food safety law,
including relevant laws and regulations of foreign countries. We
tentatively concluded that we would not, for example, require that a
facility submit documentation to FDA demonstrating the content of their
hazard identification, preventive controls, or monitoring of the
implementation of preventive controls; or copies of their non-Federal
licenses, inspection reports, certificates, permits, credentials, or
certifications. We proposed to require that the information be
resubmitted to FDA at least every 2 years, or whenever there is a
material change to the information. Finally, we proposed to require
that a qualified facility maintain records relied upon to support their
assertion of meeting the requirements of the qualified exemption. We
tentatively concluded that it is appropriate to require that the
records relied upon to support a self-certified statement be retained
and made available to FDA upon request.
Proposed Sec. 121.5(a) would require that qualified facilities,
upon request, provide for official review documentation that was relied
upon to demonstrate that the facility meets this exemption. In
addition, proposed Sec. 121.5(a) would provide that such documentation
must be retained for 2 years. We are not proposing to apply all of the
modified requirements described in proposed Sec. 117.201 in the PC
proposed rule to qualified facilities that would be covered under this
rule. We have tentatively concluded that such an approach is
reasonable, considering the context and wording of the statutory
provision as it relates to intentional adulteration caused by acts of
terrorism.
c. Withdrawal of exemption for qualified facilities. Section
418(l)(3) of the FD&C Act provides that the Secretary of Health and
Human Services may withdraw the exemption provided in section
418(l)(2)(A) under certain circumstances. We discuss the withdrawal
provisions of section 418(l)(3) of the FD&C Act, and the process we
propose to use to withdraw an exemption for a qualified facility
subject to that rule in section XIV.E of the PC proposed rule. We ask
for comment on the appropriateness of those proposed procedures to
withdraw an exemption for a qualified facility subject to this proposed
rule. We also seek input on whether we should include the process for
such withdrawal within proposed part 121 or whether those provisions
might be best placed in a separate part and cross-referenced in
proposed part 121 in order to reduce duplication, given these
provisions also appear in the PC and the Produce Safety proposed rules.
2. Proposed Sec. 121.5(b)--Exemption for Holding of Food
a. Requirement of section 418 of the FD&C Act. Section 418(m) of
the FD&C Act provides in relevant part that FDA may by regulation
``exempt or modify the requirements for compliance under [section 418
of the FD&C Act] with respect to facilities that are solely engaged in
. . . the storage of raw agricultural commodities (other than fruits
and vegetables) intended for further distribution or processing or the
storage of packaged foods that are not exposed to the environment.'' In
the PC proposed rule, we proposed exemptions and modified requirements
based on this provision (see proposed Sec. Sec. 117.5(j), 117.7, and
117.206).
b. Petition relevant to section 418(m) of the FD&C Act. In a letter
dated July 22, 2011, an industry coalition of the American Bakers
Association, the American Frozen Food Institute, the Grocery
Manufacturers Association, the International Bottled Water Association,
the International Dairy Foods Association, the International Warehouse
Logistics Association, the Peanut and Tree Nut Processors Association,
and the Snack Food Association (the section 418(m) petitioners)
submitted a citizen petition (Docket No. FDA-2011-P-0561). The petition
requests that FDA issue regulations under section 418(m) of the FD&C
Act ``to exempt from compliance or modify the requirements for
compliance under section 418 [of the FD&C Act] for facilities that are
solely engaged in the storage of packaged foods that are not exposed to
the environment, by allowing such facilities to satisfy the
requirements of that section through compliance with the [CGMPs]
mandated for such facilities by [current] Sec. 110.93.'' The section
418(m) petitioners assert that the food safety issues presented by
facilities used only to store packaged foods that are not exposed to
the environment are essentially the same, regardless of the type of
food. As such, trade associations representing a variety of product
sectors are signatories to the petition and are supportive of the
request to exempt such facilities from the provisions of section 418 of
the FD&C Act.
The section 418(m) petitioners stated, ``As an initial matter, the
risk of intentional adulteration at facilities solely engaged in the
storage of packaged foods not exposed to the environment is quite
remote. The food in these facilities is stored in unit packaging,
meaning any effort to adulterate the food would be laborious and likely
ineffective.'' They further
[[Page 78036]]
asserted that, ``Members of the food industry have implemented a number
of precautions against intentional adulteration. Most importantly,
these facilities are locked and secured against unauthorized entry.
Access is restricted to the employees of the manufacturer dropping off
food, any staff employed at the facility, and the persons who deliver
food to retailers and other customers. Food is often held in such
facilities for a short period of time, which would not be conducive to
attempts at intentional adulteration. Further, we note that the
continual activity in these facilities during pickup and drop-off hours
serves as a deterrent for anyone attempting to gain unauthorized
access.''
c. Proposed exemption for the holding of food. Proposed Sec.
121.5(b) would exempt from the requirements in proposed part 121 the
holding of food, except the holding of food in liquid storage tanks.
This provision is broader in scope than exemptions in proposed
Sec. Sec. 117.5(j) and 117.7 in the PC proposed rule, and would
exempt, for example, storage of whole grains, shell eggs, fruits and
vegetables, and packaged foods (including packaged milk and orange
juice). It would not exempt, for example, storage in bulk storage tanks
of milk or liquid orange juice.
As discussed in section V.C.2 of this document, based on an
analysis of the vulnerability assessments that FDA has conducted using
the CARVER+Shock methodology, we identified four key activity types
(Bulk liquid receiving and loading; Liquid storage and handling;
Secondary ingredient handling; and Mixing and similar activities) as
production processes that require focused mitigation strategies. With
the exception of the holding of food in liquid storage tanks, which is
not included in the proposed exemption, we are not aware of activities
performed during the holding of food that fit within any of these four
key activity types.
We acknowledge that our proposed exemption in Sec. 121.5(b) is not
identical to the exemption in section 418(m) of the FD&C Act. However,
as explained above, the holding of food that would be exempt does not
include any of the four key activity types associated with actionable
process steps under proposed Sec. 121.130(a). Consequently, even
without an exemption, this holding of food would not require the
implementation of focused mitigation strategies under proposed Sec.
121.130(a) to protect food against intentional adulteration. The only
requirement related to holding activities would be for a written
assessment that would conclude that no focused mitigation strategies
are necessary with regard to the holding activities. Under these
circumstances, we have tentatively concluded that an exemption is
appropriate. Accordingly, we propose to exempt the holding of food,
except the holding of food in liquid storage tanks, from the
requirements of this proposed regulation. Although we are not
responding to the merits of the arguments of the section 418(m)
petitioners with regard to precautions against intentional
adulteration, we believe that this proposed exemption meets the request
of the section 418(m) petitioners.
3. Proposed Sec. 121.5(c)--Exemption for Packing, Re-Packing,
Labeling, and Re-labeling of Food
Proposed Sec. 121.5(c) would exempt from the requirements in
proposed part 121 the packing, re-packing, labeling, or re-labeling of
food where the container that directly contacts the food remains
intact. As discussed in section V.C.2 of this document, based on an
analysis of the vulnerability assessments that FDA has conducted using
the CARVER+Shock methodology, we identified four key activity types
(Bulk liquid receiving and loading; Liquid storage and handling;
Secondary ingredient handling; and Mixing and similar activities) as
production processes that require focused mitigation strategies. We are
not aware of activities performed during the packing, re-packing,
labeling, or re-labeling of food where the immediate package or
container of the food remains intact that fit within any of these four
key activity types.
As discussed in section V.A of this document, the proposed rule
would not require a facility that chooses to identify its actionable
process steps under proposed Sec. 121.30(a) to implement focused
mitigation strategies for a food process that does not include any of
the four key activity types. Even without the exemption, a facility
that conducts packing, re-packing, labeling, or re-labeling activities
would be able to conclude that it has no key activity types and,
therefore, would not be required to implement focused mitigation
strategies. However, without an exemption, under proposed Sec.
121.130, such a facility would be required to perform a written
assessment to make this determination. We have tentatively concluded
that requiring such an assessment is unnecessary. Consequently, we
propose to exempt the packing, re-packing, labeling, or re-labeling of
food where the container that directly contacts the food remains intact
from the requirements of this proposed regulation.
4. Proposed Sec. 121.5(d)--Exemption for Produce Farms
Proposed Sec. 121.5(d) would exempt from the requirements in
proposed part 121 the activities of a facility that are subject to
section 419 of the FD&C Act (Standards for Produce Safety). We discuss
our tentative decision not to cover produce farms under section 419 of
the FD&C Act in sections IV.B and IV.F, respectively, of this document.
Section 418(k) of the FD&C Act provides that section 418 ``shall
not apply to activities of a facility that are subject to section
419''. Section 419 of the FD&C Act, ``Standards for Produce Safety,''
requires FDA to establish by regulation ``science-based minimum
standards for the safe production and harvesting of those types of
fruits and vegetables, including specific mixes or categories of fruits
and vegetables, that are raw agricultural commodities for which [FDA]
has determined that such standards minimize the risk of serious adverse
health consequences or death.'' Section 419(h) of the FD&C Act provides
that section 419 ``shall not apply to activities of a facility that are
subject to section 418.''
Establishments that are exempt from registration under section 415
of the FD&C Act as ``farms'' would not be subject to section 418 of the
FD&C Act when conducting activities within the farm definition. Farm
mixed-type facilities would be subject to section 418 of the FD&C Act
when conducting those activities that trigger the section 415
registration requirement. We have tentatively concluded that
Congressional intent regarding the reach of section 418(k) of the FD&C
Act is unambiguous in that section 418(k) directly limits the exemption
to activities of the facility that are subject to section 419 of the
FD&C Act. We have also tentatively concluded that we should include a
provision implementing section 418(k) of the FD&C Act in the proposed
regulation to establish by regulation the reach of the exemption.
Therefore, in proposed Sec. 121.5(d), we are proposing that proposed
part 121 would not apply to activities of a facility that are subject
to section 419 of the FD&C Act (Standards for Produce Safety).
At the time FDA developed the farm definition and its
interpretations of that definition, the practical impact of an
activity's classification as inside or outside that definition was
limited to the potential to trigger the section 415 registration
regulations and the section 414 recordkeeping regulations. With the
[[Page 78037]]
advent of FSMA, the scope of the farm definition has taken on more
importance because, for example, activities within the farm definition
are not subject to section 418 of the FD&C Act, but activities outside
the farm definition are subject to section 418. Therefore, FDA proposed
to clarify and adjust the scope of the farm definition, including the
classification of manufacturing, processing, packing, and holding
activities relevant to that definition, in the proposed preventive
controls regulations for human food. In section VIII.D of the PC
proposed rule, we described a set of organizing principles that would
form the basis for our proposal for classifying activities to more
accurately reflect the scope of activities traditionally conducted by
farms and to allow for more certainty among industry with regard to how
their activities will be regulated.
5. Proposed Sec. 121.5(e)--Exemption for Alcoholic Beverages
Proposed Sec. 121.5(e)(1) would provide that proposed part 121
does not apply with respect to alcoholic beverages at a facility that
meets the following two conditions: (i) Under the Federal Alcohol
Administration Act (27 U.S.C. 201 et seq.) or chapter 51 of subtitle E
of the Internal Revenue Code of 1986 (26 U.S.C. 5001 et seq.) the
facility is required to obtain a permit from, register with, or obtain
approval of a notice or application from the Secretary of the Treasury
as a condition of doing business in the United States, or is a foreign
facility of a type that would require such a permit, registration, or
approval if it were a domestic facility; and (ii) Under section 415 of
the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 350d) the facility
is required to register as a facility because it is engaged in
manufacturing, processing, packing, or holding one or more alcoholic
beverages.
Proposed Sec. 121.5(e)(2) would provide that proposed part 121
does not apply with respect to food other than alcoholic beverages at a
facility described in paragraph (e)(1) of this section, provided such
food: (i) Is in prepackaged form that prevents any direct human contact
with such food; and (ii) Constitutes not more than 5 percent of the
overall sales of the facility, as determined by the Secretary of the
Treasury.
In section X.C.7 of the PC proposed rule, we explain in detail our
interpretation of section 116 of FSMA and our consideration of hazards
and preventive controls for the manufacturing, processing, packing, and
holding of alcoholic beverages. Based on that analysis, we proposed, in
proposed Sec. 117.5(i), to exempt certain facilities engaged in the
manufacturing, processing, packing, or holding of alcoholic beverages
and other food. Consistent with that analysis, we are proposing similar
exemptions related to alcoholic beverages in this proposed rule on
focused mitigation strategies for the protection of food against
intentional adulteration caused by acts of terrorism.
We have tentatively concluded that we should include a provision
implementing section 116 of FSMA in the proposed rule to establish by
regulation the reach of the provision. We request comment on our
interpretation of section 116 of FSMA, described in section X.C.7 of
the PC proposed rule, and its application to the proposed exemption in
Sec. 121.5(e).
6. Proposed Sec. 121.5(f)--Exemption for Food for Animals
Proposed Sec. 121.5(f) would exempt from the requirements of
proposed part 121 the manufacturing, processing, packing, and holding
of food for animals other than man. In the Animal Food PC proposed
rule, we proposed to require that facilities that manufacture, process,
pack, or hold animal food and that are not otherwise covered by certain
exemptions, design and implement a system of preventive controls to
address food safety issues. In that proposed rulemaking, we tentatively
concluded that hazards associated with intentional adulteration would
likely require different kinds of controls and would be best addressed
in a separate rulemaking.
We also requested comment in that rulemaking on whether to include
in those regulations potential hazards that may be intentionally
introduced for economic reasons, which we refer to as economically
motivated adulteration, a type of intentional adulteration. Our current
thinking regarding economically motivated adulteration is discussed in
section IV.F of this document.
Section 418(m) of the FD&C Act authorizes FDA to exempt or modify
the requirements for compliance with section 418 with regard to
facilities that engage solely in the production of animal food.
Further, section 420(c) of the FD&C Act requires that regulations that
FDA issues under that section apply only to food for which there is a
high risk of intentional contamination. In section IV.A of this
document, we discuss how FDA is proposing to implement the provisions
of sections 418 and 420 of the FD&C Act with regard to circumstances
under which a facility subject to either of these sections would be
required to have and implement focused mitigation strategies under a
HACCP-like system to address intentional adulteration related to
terrorism. In summary, this proposed rule would require a facility to
implement focused mitigation strategies if one or more of four key
activity types are applicable to its food operation or if a facility
conducts its own vulnerability assessment and identifies actionable
process steps for significant vulnerabilities in its food operation.
The identification of a production step for a food as necessitating
focused mitigation strategies is premised upon an analysis, based on
CARVER+Shock methodology, that an attack at these points in the
production of a food would likely result in an outcome that is
consistent with our understanding of the goal of terrorist
organizations (i.e., maximizing adverse public health impacts and, to a
lesser extent, economic disruption) (Ref. 54). For human foods, our
analyses show the potential for significant human morbidity and
mortality should intentional adulteration occur at any one or more of
these points in a food operation. (Significant economic harm is also
likely, related to the human morbidity and mortality as well as
disruption in the food supply as a result of loss of consumer
confidence in its safety.) In contrast, for animal food, our analysis
shows only minimal potential for human morbidity or mortality as a
result of attacks at key activity types or other points in an animal
food operation. Significantly, our CARVER+Shock vulnerability
assessments of animal food have had to focus entirely on economic
consequences because of the lack of potential for human morbidity and
mortality.
In considering whether to provide an exemption related to animal
food, we evaluated three types of possible attack scenarios: (1)
Incorporation of a contaminant into feed to be used for muscle meat-
producing animals; (2) incorporation of a contaminant into feed to be
used for egg-producing or milk-producing animals; and (3) incorporation
of a contaminant into pet food. With regard to the two former
scenarios, we are not aware of contaminants that could be incorporated
into feed at levels that would not produce noticeable clinical signs
and/or mortality in animals but would result in significant human
morbidity or mortality among consumers that subsequently eat the meat,
eggs or milk (Ref. 55). While contaminants can increase the risk of
chronic disease, such as cancer, among consumers (Ref. 56), such an
outcome is not consistent
[[Page 78038]]
with our understanding of the goals of terrorist organizations, which
include a more immediate impact. We recognize that such an attack could
result in significant economic disruption because of the loss of
consumer confidence in the safety of the food supply. While important,
attacks of that nature fall significantly below those involving human
morbidity and mortality when placed on a scale of risk with regard to
targeting by terrorist organizations.
Regarding the third attack scenario (incorporation of a contaminant
into pet food), we are aware of contaminants that could be incorporated
into feed or pet food that could result in significant animal
(including pet) morbidity and mortality, including some which could
result in secondary infectious spread of disease (because some
infectious agents can be transmitted orally as well as through
aerosol). Again, such attacks could be significant from an economic and
societal standpoint. However, the risk that they pose with regard to
targeting by terrorist organizations appears to be significantly lower
than those involving human morbidity and mortality. We request comment
on this assessment of risk.
Therefore, notwithstanding the likely presence of one or more of
the four key activity types in the production of many animal foods, we
have tentatively concluded that animal food (regardless of whether it
is produced at a facility solely engaged in the production of animal
food or at a facility engaged in the production of both animal and
human food) does not involve significant vulnerabilities that require
focused mitigation strategies under section 418 of the FD&C Act and is
not at high risk for intentional adulteration related to terrorism
under section 420 of the FD&C Act. Consequently, we are proposing to
exempt the manufacturing, processing, packing, and holding of food for
animals other than man. We request comment on these tentative
conclusions.
C. Food Defense Measures
In subpart C of proposed part 121, FDA is proposing various food
defense measures, including requirements for a food defense plan,
identification of actionable process steps, implementation of focused
mitigation strategies and related monitoring, corrective actions, and
verification, and training of certain personnel. We discuss the
provisions of proposed subpart C in this section.
1. Food Defense Plan
a. Proposed Sec. 121.126(a)--Requirement for a Food Defense Plan.
Proposed Sec. 121.126(a) would require that the owner, operator, or
agent in charge of a facility prepare, or have prepared, and implement
a written food defense plan. To make clear that the written plan is
related to food defense rather than to other plans a facility may have
(such as quality control plans or food safety plans), for purposes of
this rulemaking, we have designated the ``written plan'' to be a ``food
defense plan.'' A written food defense plan is essential for a facility
covered by this rule to implement the plan consistently, train its
employees, and periodically reanalyze and update the plan. It is also
essential to auditors, and to inspectors, in the same way written plans
are essential to ensuring food safety. A written food defense plan
addressing vulnerabilities associated with intentional adulteration is
analogous to a written HACCP or food safety plan for hazards associated
with unintentional contamination.
Proposed Sec. 121.126(a) would provide flexibility for the owner,
operator, or agent in charge of the facility to either prepare the
written food defense plan or have that plan prepared, in whole or in
part, on its behalf. In addition, proposed Sec. 121.126 would provide
flexibility for facilities in the development of their food defense
plans by allowing facilities to group food types or production method
types if the vulnerabilities, focused mitigation strategies, and other
required procedures, such as monitoring, are essentially identical.
Proposed Sec. 121.126(a) would require that the owner, operator,
or agent in charge of a facility implement the written food defense
plan. Our proposed requirement to develop and implement a food defense
plan, which includes the identification of actionable process steps and
implementation of focused mitigation strategies, reflects our tentative
conclusion that such actions are measures necessary to prepare and
protect the food supply from intentional adulteration caused by acts of
terrorism. Proposed Sec. 121.126(a) implements sections 418(b), (c),
(d), (e), (f), and (h), and 420(b) of the FD&C Act. We seek comment on
these tentative conclusions.
b. Proposed Sec. 121.126(b)--Contents of a food defense plan.
Proposed Sec. 121.126(b)(1) through (b)(5) would require that the
contents of a food defense plan include:
The written identification of actionable process steps as
required by proposed Sec. 121.130;
The written focused mitigation strategies as required by
proposed Sec. 121.135(b);
The written procedures for monitoring as required by
proposed Sec. 121.140(a);
The written corrective action procedures as required by
proposed Sec. 121.145(a)(1); and
The written verification procedures as required by
proposed Sec. 121.150(e).
Although we are proposing to require that the contents of food
defense plan include only the specific elements described above, the
food defense plan can be used as a resource for facilities to capture
additional food defense-related information. For example, facilities
may also wish to include information, such as process flow diagrams, an
evaluation of broad mitigation strategies, emergency contact
information, crisis management plans, action plans for implementation
of broad mitigation strategies, results of supplier audits, and other
documents, analysis, reviews, or information the facility finds
relevant to its food defense program. FDA has developed and publicly
released the user-friendly FDPB software tool that can be used to
assist a facility to develop a robust food defense plan. This free tool
is available on the FDA Web site at https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm349888.htm.
Proposed Sec. 121.126, if finalized, would establish a requirement
for every facility covered by this rule to have its own written food
defense plan. Like the food safety plan, this facility-based nature of
the written food defense plan is consistent with the overall framework
of section 418 of the FD&C Act, which is directed to a facility rather
than, for example, a corporate entity that may have multiple
facilities.
Proposed Sec. 117.126(c) of the PC proposed rule would require
that the food safety plan be prepared by (or its preparation overseen
by) a qualified individual (See the discussion in section XII.A.4 of
the PC proposed rule). We are proposing to require that the
vulnerability assessment be performed by an individual qualified by
experience and/or training only when facilities choose to identify
actionable process steps in their food defense plans using the
provisions of proposed Sec. 121.130(b), whereby they would perform
their own vulnerability assessment. Our proposal is based on two
considerations. First, we anticipate that most facilities will develop
their food defense plan using the procedure in proposed Sec.
121.130(a) for identification of actionable process steps. Here, FDA
has performed much of the scientific analysis required and identified
the key activity types (see section V.C.2 of this document for
[[Page 78039]]
further discussion). Second, we believe that the identification of
focused mitigation strategies, and the monitoring, corrective action
and verification activities to implement them requires less technical
expertise than required for preventive controls and implementation
procedures for those controls. The former usually involve focused
mitigation strategies to limit access to specific steps in the
production process with simple visual checks to monitor them, while the
latter often involve scientific studies to establish critical limits
with process control instruments to monitor them.
Proposed Sec. 121.126(b) implements sections 418(h) and 420(b)(2)
of the FD&C Act.
We seek comment on our proposed provisions related to the written
food defense plan and its contents.
2. Identification of Actionable Process Steps
a. FDA's vulnerability assessments and FDA-identified key activity
types. As noted in section II.B of this document, under the SPPA
Initiative, FDA, along with USDA, FBI, and DHS, conducted vulnerability
assessments on products and processes in the food and agriculture
sector. After conclusion of the initiative, FDA continued conducting
assessments for products and processes not previously assessed. To
implement section 420(a)(1)(A), FDA combined and analyzed data from a
subset of these assessments (i.e., those relevant to the food
manufacturing and distribution segments of the food system) and
identified activities which consistently ranked high for vulnerability
to intentional adulteration. FDA published the results of this analysis
in April, 2013 (April 2013 Report) (Ref. 54).
CARVER+Shock methodology is a tool for assessing the
vulnerabilities within a food system and determining the most
vulnerable points, and focusing resources on protecting the most
susceptible points. Using the CARVER+Shock methodology, FDA, in
collaboration with other U.S. government partners conducted over 50
vulnerability assessments on a wide range of food products and
processes. Based on these assessments, we identified the processing
steps with the greatest vulnerability to intentional adulteration
caused by acts of terrorism. Through this review, we determined that
the processing steps we identified fit into one of four groups of
activities occurring at those processing steps. We refer to these as
``key activity types.'' The key activity types that we have identified
are: (1) Bulk liquid receiving and loading, (2) Liquid storage and
handling, (3) Secondary ingredient handling, and (4) Mixing and similar
activities. In this proposed rule we have modified the activity type
names and descriptions from those in the April 2013 Report for clarity.
Providing these key activity types to facilities for their use in
identifying actionable process steps and developing focused mitigation
strategies provides some advantages over other approaches that we might
have taken, such as identifying points in the production of specific
foods at increased risk for intentional adulteration caused by an acts
of terrorism, or requiring each facility to perform its own
vulnerability assessment. First, publicly providing a list of key
activity types does not disclose sensitive information, as might be the
case if we provided CARVER+Shock scores derived from our vulnerability
assessments for process steps for specific foods.
Second, providing a list of key activity types rather than
requiring facilities to perform their own facility-specific
vulnerability assessments relieves the burden upon the facility to
assemble a team of individuals with the diverse expertise needed to
properly self-score the steps in their process (using the CARVER+Shock
Vulnerability Assessment software tool or another suitable tool). When
we performed vulnerability assessments during the SPPA initiative our
teams included individuals with expertise in the production of the food
under study, law enforcement, food science, food regulatory systems,
and public health. We expect that such an effort is likely beyond the
capacity of many facilities. Further, by providing a list of key
activity types, we eliminate the need to identify a CARVER+Shock score,
for example, as the threshold for the implementation of focused
mitigation strategies. This is important because CARVER+Shock scores
are somewhat subjective and difficult to correlate across food types,
making identification of a universal threshold score challenging.
b. Proposed Sec. 121.130--Requirement for written identification
of actionable process steps. Proposed Sec. 121.130 would require that
the owner, operator, or agent in charge of a facility identify any
actionable process steps, using the procedures in either proposed Sec.
121.130(a) or proposed Sec. 121.130(b). A facility would be required
to follow either one of the two specified procedures, but not both.
Proposed Sec. 121.130 would also require that the identification
of actionable process steps and the assessment leading to that
identification be written. A written assessment of whether the facility
has one or more of the key activity types (under proposed Sec.
121.130(a)) or a written vulnerability assessment (under proposed Sec.
121.130(b)) would help the facility organize its assessment, and fully
understand the nature of the vulnerabilities. In addition, it is
essential for auditors and inspectors to assess the adequacy of the
facility's assessment. This written identification of actionable
process steps would also be essential during reanalysis of the food
defense plan, as would be required by proposed Sec. 121.150(d). Such a
written document would also be useful for training purposes as a tool
to make employees aware of the elements of the facility's food defense
plan.
The written identification of actionable process steps must include
the justification for whatever conclusion the owner, operator, or agent
in charge of a facility reaches. Proposed Sec. 121.130 would not limit
the requirement for a written identification of actionable process
steps to only those circumstances where the owner, operator, or agent
in charge of a facility identifies one or more actionable process
steps. Rather, under proposed Sec. 121.130, a written analysis would
be required even if the conclusion of the analysis is that there are no
actionable process step.
If a facility chooses to identify actionable process steps using
the procedure in proposed Sec. 121.130(a), the written documentation
would not need to include the procedures for assessing the
vulnerabilities associated with identified actionable process steps. If
a facility chooses to identify actionable process steps using the
procedure in proposed Sec. 121.130(b), the written identification of
actionable process steps must include information about the appropriate
methods used to conduct the vulnerability assessment and identify
actionable process steps, and the experience and training of the
person(s) who conducted that assessment (see also discussion in section
V.C.2.d of this document).
Proposed Sec. 121.130 implements sections 418(b)(2), 418(b)(3),
420(a)(1), and 420(b)(1) of the FD&C Act.
c. Proposed Sec. 121.130(a)--Identification of actionable process
steps using FDA-identified key activity types. Proposed Sec.
121.130(a) would specify the first of two procedures by which the
proposed requirement for identification of actionable process steps in
proposed Sec. 121.130 can be met, i.e., using the FDA-identified key
activity types.
[[Page 78040]]
Proposed Sec. 121.130(a) would state that the owner, operator, or
agent in charge of a facility must assess, for each type of food
manufactured, processed, packed or held at the facility, whether the
facility has one or more of the following key activity types and
identify the actionable process steps associated with any key activity
types present:
1. Bulk liquid receiving and loading--a step in which a bulk liquid
is received and unloaded from an inbound conveyance or loaded into an
outbound conveyance where a contaminant can be intentionally introduced
and, if it is, it is likely that the contaminant will be distributed
throughout the liquid due to sloshing, movement, or turbulence caused
by the receiving and unloading or loading activity;
2. Liquid storage and handling--a step in which a liquid is
contained in bulk storage tanks or in holding, surge, or metering tanks
where a contaminant can be intentionally introduced and, if it is, it
is likely that the contaminant will be distributed into the food;
3. Secondary ingredient handling--a staging, preparation, addition,
or rework step where a contaminant can be intentionally introduced into
a relatively small amount of ingredient or rework and, if it is, it is
likely that the contaminant will be distributed into a larger volume of
food; and
4. Mixing and similar activities--a step, such as mixing, blending,
homogenizing, or grinding where a contaminant can be intentionally
introduced and, if it is, it is likely that the contaminant will be
distributed into the food.
The owner, operator, or agent in charge would be required to assess
whether the facility has a food process that involves any one or more
of the specified four key activity types. If the food process is found
to involve any key activity types, the owner, operator, or agent would
be required to identify actionable process step(s) that are associated
with each key activity type that is present.
For example, based on proposed Sec. 121.130(a), a facility may
identify a mixing tank as involving the key activity type, Mixing and
similar activities, in its operation because the mixing tank has an
unsecured lid and several sample ports which provide direct access to
the food product and because a contaminant can be introduced into the
tank through the lid or one of the sampling ports and, if it is, the
contaminant would be distributed into the food. The owner would
conclude that the mixing tank is an actionable process step. We would
expect that this conclusion would be reached for virtually all steps
that involve mixing, blending, homogenizing, or grinding because these
kinds of process steps generally: (1) Present an opportunity for access
to the product at or just prior to the equipment (e.g., in-feed
conveyor); and (2) would cause a contaminant, if intentionally added,
to be distributed into the food. We expect this conclusion to be
reached regardless of whether the facility may already have mitigation
strategies in place to impede access to the mixing tank (e.g., a
``buddy system'' that ensures that at least two employees were present
at the mixing tank at all times or a lock on the mixing tank access
ports). The presence of mitigation strategies should not be considered
when assessing whether a facility has a process step that involves one
of the key activity types. Any existing mitigation strategies and their
adequacy to significantly minimize or prevent the significant
vulnerability should be considered at a later step when identifying
appropriate focused mitigation strategies, in accordance with proposed
Sec. 121.135.
We acknowledge the possibility, although not likely, that
circumstances may exist where access at or just prior to the equipment
is not possible (i.e., because the equipment is fully enclosed, with no
access ports), and that in such a situation this process step would not
be identified as fitting within the key activity type. For example, the
owner of the same facility may assess a second mixing tank that is part
of an entirely closed system, with no direct access points into the
system, such that an individual attempting to access this mixing tank
would likely cause a major disruption to the line, foiling any
attempted intentional adulteration. Based on this assessment, the owner
may conclude that the enclosed nature of this second mixing tank
renders the product inaccessible at this step and, therefore, it does
not fit within the key activity type. In this circumstance, there would
be no requirement to identify an actionable process step associated
with this mixing tank (in which case, there also would be no
requirement to implement a focused mitigation strategy at this step).
Under proposed Sec. 121.130, the owner would be required to document
the basis for the determination that the second mixing tank does not
fit within the key activity type. The second mixing tank would continue
to be subject to the requirement for reanalysis of a food defense plan,
as proposed in Sec. 121.150(d) and the facility would consider the
applicability of the four key activity types during reanalysis. We
request comment on whether there are specific process steps for
specific products that otherwise fit within one of the four key
activity types but for which access to the equipment is not possible
(i.e., because the equipment is fully enclosed, with no access ports).
If the owner, operator, or agent in charge determines that the food
operation does not involve any of the key activity types, there would
be no need to identify actionable process steps. Such a facility,
however, would still be required to document its finding that none of
the key activity types apply to its food processes, under proposed
Sec. 121.130. The documentation would be a part of the written food
defense plan required under proposed Sec. 121.126. Such a facility
would continue to be subject to the requirement for reanalysis of a
food defense plan, as proposed in Sec. 121.150(d).
Proposed Sec. 121.130(a) would require that the process of
identification of actionable process steps be done ``for each type of
food manufactured, processed, packed, or held at the facility.'' The
vulnerability of a food to intentional contamination may differ based
on the type of food and associated process, practices, and conditions
at the facility. Therefore, we are proposing that the facility assess
whether it has any of the key activity types for each type of food that
is manufactured, processed, packed, or held at that facility. A
facility may find that its operation related to one type of food
manufactured at that facility involves one or more of the key activity
types, but all other types of food manufactured at that facility do not
involve any of the key activity types. In such an instance, actionable
process steps would need to be identified and focused mitigation
strategies implemented only for the food type that involved the key
activity types.
Description of key activity types--As discussed in section V.C.2.a
of this document, our vulnerability assessments revealed four key
activity types that most commonly rank high: Bulk liquid receiving and
loading; Liquid storage and handling; Secondary ingredient handling;
and Mixing and similar activities. We have tentatively concluded that
the presence of any of these four key activity types in a food
operation indicates a significant vulnerability for intentional
contamination caused by acts of terrorism. Based on our assessments, we
believe that these four key activity types capture the significant
vulnerabilities in a food operation. However, although generally
unlikely, a vulnerability
[[Page 78041]]
assessment of a specific food at a specific facility conducted under
proposed Sec. 121.130(b) may identify significant vulnerabilities at
actionable process steps that are not associated with one of these four
key activity types. We seek comment on our tentative conclusion.
Proposed Sec. 121.130(a)(1) would identify ``Bulk liquid receiving
and loading'' as a key activity type, based on our finding that this
activity type commonly ranked high in our vulnerability assessments.
Proposed Sec. 121.130(a) would describe this key activity type as a
step in which a bulk liquid is received and unloaded from an inbound
conveyance or loaded into an outbound conveyance where a contaminant
can be intentionally introduced and, if it is, it is likely that the
contaminant will be distributed throughout the liquid due to sloshing,
movement, or turbulence caused by the receiving and unloading or
loading activity. Bulk liquid receiving refers to the inbound movement
of liquid product into a facility for its use in the food production
process, whereas bulk liquid loading refers to the outbound movement of
liquid product from a facility for further processing or use by an end
customer/consumer. Examples of products that may be received or loaded
in bulk include juices, high fructose corn syrup and other sweeteners,
milk, animal fats, syrups, and vegetable oils.
Bulk liquid receiving and loading refers to any processing step
where a liquid ingredient is being received and unloaded at a facility
or a liquid intermediate or finished product is being loaded into an
outbound shipping transport vehicle and for which there is an
opportunity for a contaminant to be intentionally introduced into the
food. This key activity type incorporates the actions of opening the
transport vehicle, attaching any pumping equipment or hoses, and
opening any venting hatches. The characteristics associated with these
activities are such that there is a high probability of a contaminant,
if intentionally added, mixing within the liquid, due to significant
sloshing, movement, and turbulence associated with the receiving or
loading activity. In addition, the need for worker activity associated
with these processing steps provides access to hoses, the transport
vessel, and potentially the product as it is being received or loaded.
Proposed Sec. 121.130(a)(2) would identify ``Liquid storage and
handling'' as a key activity type, based on our finding that this
activity type ranked high in our vulnerability assessments. Proposed
Sec. 121.130(a) would describe this key activity type as a step in
which a liquid is contained in bulk storage tanks or in holding, surge,
or metering tanks where a contaminant can be intentionally introduced
and, if it is, it is likely that the contaminant will be distributed
into the food. This key activity type refers to any processing step
where a liquid ingredient or intermediate or finished liquid product is
stored in either bulk storage tanks or smaller secondary, non-bulk
holding tanks or surge tanks and for which there is an opportunity for
a contaminant to be intentionally introduced into the food. Bulk liquid
storage refers to any storage silo or tank where liquid product may be
stored prior to introduction into the product stream or prior to
loading for outbound shipping. Non-bulk tanks can be used to store non-
bulk liquid ingredients (e.g., fats, oils, vitamin mixes, and
sweeteners), hold liquid product for sample testing and other quality
control activity, or to control flow rates of liquid ingredients or
product through the production system. Non-bulk storage tanks also
include tanks or totes where the tamper evident seals are opened and
the container itself is used for holding. Both categories of liquid
storage can be considered key processing steps because if a contaminant
were successfully introduced, there is a high probability of a
contaminant mixing within the liquid due to the agitation commonly used
to prevent separation within the liquid medium. Access necessary for
the introduction of a contaminant is generally available through
hatches, sample ports, and the container lid (in the case of a tanker
or tote for which the tamper evident seal has been broken).
Proposed Sec. 121.130(a)(3) would identify ``Secondary ingredient
handling'' as a key activity type, based on our finding that this
activity type commonly ranked high in our vulnerability assessments.
Proposed Sec. 121.130(a) would describe this key activity type as the
staging, preparation, addition, or rework step where a contaminant can
be intentionally introduced into a relatively small amount of
ingredient or rework and, if it is, it is likely that the contaminant
will be distributed into a larger volume of food. This key activity
type refers to any processing step where ingredients (either dry or
liquid) are manipulated prior to or during addition to the product
stream by human contact and for which there is an opportunity for a
contaminant to be intentionally introduced into the food. ``Staging''
refers to the process of opening the tamper evident packaging of a
secondary ingredient and moving the ingredient to the production area
in advance of being added into the primary product stream.
``Preparation'' refers to any act of measuring, weighing, premixing, or
otherwise manipulating the ingredient prior to addition to the product
stream. ``Addition'' refers to any act of physically adding ingredient
directly into the product stream or into surge or meter hoppers in
order to deliver the ingredient into the product stream. ``Rework''
refers to clean, unadulterated food that has been removed from
processing for reasons other than insanitary conditions or that has
been successfully reconditioned by reprocessing and that is suitable
for use as food. Staging, preparation, addition, and rework involving
secondary ingredients are key activities because a contaminant added to
a relatively small volume of product would be distributed into the
large product flow as the ingredient or rework is combined with the
other components of the food. Secondary ingredient staging,
preparation, addition, and rework are generally open and accessible and
that accessibility is an inherent component of the activity. Thus,
these key activities provide a potential point of access where a
contaminant could be introduced into the product stream.
Proposed Sec. 121.130(a)(4) would identify ``Mixing and similar
activities'' as a key activity type, based on our finding that the
activities commonly ranked high in our vulnerability assessments.
Proposed Sec. 121.130(a) would describe this key activity type as a
step, such as mixing, blending, homogenizing, coating, glazing, or
grinding where a contaminant can be intentionally introduced and, if it
is, it is likely that the contaminant will be distributed into the
food. This key activity type refers to any processing step where there
is an opportunity for a contaminant to be intentionally introduced into
the food, and the primary purpose or result of the processing step is:
(1) Coating, i.e., to layer a powder or liquid onto the surface of a
product, such as a batter, breading, glazing or flavoring; (2) mixing,
i.e., to blend a powder, dough, or liquid ingredient together; (3)
grinding, i.e., to reduce the particle size of a solid ingredient or
mass to a smaller granularity; or (4) homogenizing, i.e., to reduce the
particle size of an ingredient and disperse it throughout a liquid.
These are key activities because a potential contaminant
successfully added at one of these steps would generally be readily
dispersed throughout the product. Further, access is generally
available through access ports, lids, and in-feed conveyors or
[[Page 78042]]
flumes. Examples of equipment associated with these activities include:
Mixers, blenders, homogenizers, cascade breaders, mills, grinders, and
pulverizers.
We seek comment on these key activity types, and whether they are
each appropriate to include and whether there are additional activities
that present significant vulnerability to intentional adulteration
caused by acts of terrorism.
Proposed Sec. 121.130(a) implements sections 418(a) through (c)
and 420(a)(1)(A) of the FD&C Act.
d. Proposed Sec. 121.130(b)--Identification of actionable process
steps by conducting a vulnerability assessment. Proposed Sec.
121.130(b) would provide the second of two options for identification
of actionable process steps. Proposed Sec. 121.130(b) would specify
that the owner, operator, or agent in charge of a facility must conduct
or have conducted, for each food type manufactured, processed, packed
or held at the facility, an evaluation to identify and prioritize the
points, steps, and procedures in a food operation based on their
vulnerability to intentional adulteration and to identify actionable
process steps.
Proposed Sec. 121.130(b) would provide flexibility to the owner,
operator, or agent in charge of a facility covered by this rule to
conduct, or have conducted, their own vulnerability assessment of the
food operations at a facility, rather than assessing their food
operation against the FDA-identified key activity types. We are
proposing that a vulnerability assessment conducted under proposed
Sec. 121.130(b) must be performed by an individual(s) qualified by
experience and/or training using appropriate methods. Training or job
experience is essential to the effective evaluation of vulnerabilities
and identification of actionable process steps. Only a trained
individual or individual qualified by job experience using appropriate
methods would be capable of effectively conducting a vulnerability
assessment, including assessing the various points, steps, or
procedures in a food process; identifying and prioritizing those
points, steps, or procedures in a food process that are susceptible to
intentional contamination; and identifying actionable process steps
where food defense measures are essential to address significant
vulnerabilities. Our proposed definition of significant vulnerability
(in proposed Sec. 121.3), too, reflects the need for a qualified
individual to make such assessments where focused mitigation strategies
would be necessary to protect the food from intentional adulteration
caused by acts of terrorism. As noted above, when we performed
vulnerability assessments during the SPPA initiative our teams included
individuals with expertise in the production of the food under study,
law enforcement, food science, food regulatory systems, and public
health. While we are not proposing to specify the particular training
or experience requirements of the individual(s) qualified to conduct
such vulnerability assessments, or the particular methods that must be
used to conduct these assessments, facilities choosing this procedure
in proposed Sec. 121.130(b) would be required to employ appropriate
methods and use a qualified individual(s) to conduct a robust and
scientifically sound vulnerability assessment of the facility's food
operation. FDA's resources available online, such as the CARVER+Shock
Vulnerability Assessment software tool and the FDPB software tool may
be helpful.
Finally, as in the case of proposed Sec. 121.130(a), proposed
Sec. 121.130(b) would require that the process of identification of
actionable process steps be done ``for each type of food manufactured,
processed, packed, or held at the facility.'' See discussion in section
V.C.2 of this document.
Elements of a Facility-Specific Vulnerability Assessment--The
elements of an approach to conducting a facility-specific vulnerability
assessment are:
Planning to conduct a vulnerability assessment--collect
and evaluate appropriate background information on biological,
chemical, physical, and radiological agents of concern, such as those
found in the CDC's Select Agents and Toxins List (Ref. 57);
Assembling the vulnerability assessment team--identify
appropriate individuals within the organization to assist in the
vulnerability assessment process. This may include personnel working in
the areas of security, food safety/quality assurance or control, human
resources, operations, maintenance, and other individuals deemed
necessary to facilitate the formation of a vulnerability assessment;
Developing a process flow diagram--list out each of the
steps in the food process to be evaluated;
Identifying significant vulnerabilities--evaluate each
process step to prioritize vulnerabilities and identify significant
vulnerabilities. For each process step, the evaluation should consider,
at a minimum: (1) The potential public health impact if a contaminant
were added; (2) whether downstream processing steps would eliminate or
remove agents of concern; (3) the degree of physical access to product;
(4) the ability of an aggressor to successfully contaminate the
product; and (5) the volume of product impacted. This evaluation should
also include the rationale or justification for which process steps
were and were not identified as significant vulnerabilities; and
Identifying actionable process steps--for identified
significant vulnerabilities, indicate where actionable process steps
exist in the food process and where associated focused mitigation
strategies would be required to be implemented, under proposed Sec.
121.135.
Facilities that choose this alternative may need assistance from
outside experts who are knowledgeable in food defense and vulnerability
assessments. Some facilities may not have the resources or the
necessary expertise on site and expert advice may be obtained when
necessary from other sources, such as trade and industry associations,
independent experts, and regulatory authorities.
We seek comment on the need for, and appropriateness of, proposed
Sec. 121.130(b), including whether, in a final rule, we should specify
the particular qualifications of individual(s) performing the
vulnerability assessment or the methods that must be used under this
alternative procedure, and whether the vulnerability assessment
elements, we described previously, provide sufficient direction
regarding appropriate methodology.
Proposed Sec. 121.130(b) implements sections 418(a) to (c) and
420(a)(1)(A) of the FD&C Act.
3. Focused Mitigation Strategies
a. Requirements of sections 418 and 420 of the FD&C Act. Section
418(c)(2) of the FD&C Act, in relevant part, specifies that the owner,
operator, or agent in charge of a facility shall identify and implement
preventive controls to provide assurances that hazards identified in
the hazard analysis conducted under section 418(b)(2) of the FD&C Act
will be significantly minimized or prevented and addressed, consistent
with section 420 of the FD&C Act, as applicable. Section 418(c)(1)(3)
of the FD&C Act, in relevant part, specifies that the preventive
controls must also provide assurances that the food manufactured,
processed, packed, or held by such facility will not be adulterated
under section 402 of the FD&C Act. Section 418(h) of the FD&C Act
requires that the owner, operator, or agent in charge of a facility
prepare a written food safety plan that, among
[[Page 78043]]
other things, identifies the preventive controls within the plan.
Section 420(b) of the FD&C Act requires FDA to issue regulations to
protect against the intentional adulteration of food. Such regulations
are to specify appropriate science-based mitigation strategies or
measures to prepare and protect the food supply chain at specific
vulnerable points, as appropriate (section 420(b)(2) of the FD&C Act).
Section 418(o)(3) of the FD&C Act defines preventive controls as
``those risk-based, reasonably appropriate procedures, practices, and
processes that a person knowledgeable about the safe manufacturing,
processing, packing, or holding of food would employ to significantly
minimize or prevent the hazards identified under the hazard analysis
conducted under [section 418(b) of the FD&C Act] and that are
consistent with the current scientific understanding of safe food
manufacturing, processing, packing or holding at the time of the
analysis.'' The definition provides that ``those procedures, practices,
and processes may include the following: (A) Sanitation procedures for
food-contact surfaces and utensils and food-contact surfaces of
equipment; (B) Supervisor, manager, and employee hygiene training; (C)
An environmental monitoring program to verify the effectiveness of
pathogen controls in processes where a food is exposed to a potential
contaminant in the environment; (D) A food allergen control program;
(E) A recall plan; (F) Current Good Manufacturing Practices (cGMPs)
under part 110 of title 21, Code of Federal Regulations (or any
successor regulations); (G) Supplier verification activities that
relate to the safety of food.'' (emphasis added)
In section V.A.2 of this document, we discuss our proposed
definition of focused mitigation strategy and its relationship to the
definition of preventive controls in section 418(o)(3) of the FD&C Act.
We are not proposing requirements for sanitation procedures, hygiene
training, environmental monitoring, food allergen control, and CGMPs
because these examples are relevant to food safety, but not to food
defense. We considered proposing to require a recall plan (as we did in
the PC proposed rule in proposed Sec. 117.135(d)(4); see sections
XII.C.8 and XII.D of that document). However, we tentatively conclude
that the usefulness of a recall plan is greatly reduced in the context
of preventive controls for intentional adulteration. The relationship
between an implementation failure and the status of the food is
different in intentional adulteration and food safety contexts. An act
of intentional adulteration caused by terrorism, historically, has been
a rare event. In the vast majority of cases, the failure to properly
implement a focused mitigation strategy would not be expected to result
in intentional adulteration. With intentional adulteration,
adulteration of food requires not just the opportunity for a
contamination event (i.e., failure of a mitigation strategy to limit
access to an actionable process step), but also someone with intent to
cause harm at that same moment. As such, it is unlikely that a
deviation from the provisions of this proposed rule would necessitate a
recall. In contrast, the failure to properly implement a preventive
control for a food safety hazard (for example, where proper cook
temperatures are not reached in a process) would be expected to more
likely result in a situation where the food becomes adulterated (e.g.,
because the pathogen reasonably likely to be present in the raw food
would not be eliminated from the food by the inadequate cooking
process), potentially necessitating a recall.
b. General description of mitigation strategies. Mitigation
strategies are measures taken by a facility to reduce the potential for
intentional adulteration of food. Based on these vulnerability
assessments, FDA previously developed recommendations for mitigation
strategies that can be implemented, as appropriate, to minimize or
prevent intentional contamination of food. These mitigation strategies
are presented in our guidance documents (Ref. 22, Ref. 23, Ref. 24,
Ref. 25, Ref. 26), the CARVER+Shock Vulnerability Assessment software
tool (Ref. 29), the MSD (Ref. 30), and the FDPB software tool (Ref.
31). FDA divides mitigation strategies into two types: Broad Mitigation
Strategies and Focused Mitigation Strategies. We explain each of these
types in this section of the document.
i. Broad mitigation strategies. Broad mitigation strategies are
general facility-level measures that are intended to minimize a
facility's vulnerability, as a whole, to potential acts of intentional
contamination. Examples of broad mitigation strategies are: (1)
Physical security, such as perimeter security fencing, locking exterior
doors, penetration alarms; (2) personnel security, such as pre-hire
background, reference checks, identification badges, and controlled
visitor access; (3) securing hazardous materials, such as cleaning
products, laboratory materials, and pesticides; (4) management
practices, such as ingredient storage inventory procedures; key
security procedures, PINs or passwords; procedures to restrict personal
items from all food production areas; procedures requiring IDs and
uniforms to be returned when a person's employment ends; and supplier
verification or certification procedures; and (5) crisis management
planning, such as maintenance of updated emergency contact information,
procedures for responding to reported threats, and establishment of a
designated food defense leadership team.
Broad mitigation strategies, by nature, are generally applicable to
a facility, regardless of the type of food being processed, and, as
such, are not targeted to a specific processing step in a food
operation. Broad mitigation strategies address facility-wide
vulnerabilities that may present an opportunity for an attacker to
access the facility and intentionally adulterate food. Broad mitigation
strategies serve as foundational actions or procedures that improve a
facility's overall defense against intentional contamination caused by
acts of terrorism.
We are proposing to require the implementation of focused
mitigation strategies only. However, as set out in our guidance
documents (Ref. 22, Ref. 23, Ref. 24, Ref. 25, Ref. 26), we think it is
prudent for facilities to review our guidance and implement those broad
mitigation strategies that are appropriate to minimize the risk for
intentional adulteration of food.
ii. Focused mitigation strategies. As discussed in section V.A of
this document, we are proposing to define focused mitigation strategies
as those risk-based, reasonably appropriate measures that a person
knowledgeable about food defense would employ to significantly minimize
or prevent significant vulnerabilities identified at actionable process
steps, and that are consistent with the current scientific
understanding of food defense at the time of the analysis.
Focused mitigation strategies are specific to an actionable process
step in a food operation where a significant vulnerability is
identified. They represent reasonably appropriate measures that are
necessary to reduce the likelihood of intentional contamination caused
by an act of terrorism at that process step. Focused mitigation
strategies are customized to the processing step at which they are
applied, tailored to existing facility practices and procedures, and
depend on an evaluation of the vulnerabilities identified in a
vulnerability assessment. When properly implemented, focused
[[Page 78044]]
mitigation strategies by themselves are sufficient to significantly
minimize or eliminate the chances that an attacker would be successful
if an act of intentional adulteration were attempted at the specific
process step. Focused mitigation strategies focus on minimizing either
the accessibility of an attacker to the product at a particular process
step or the opportunity for the attacker to successfully contaminate
the product at that process step, or both.
Based on our vulnerability assessments, we tentatively conclude
that the implementation of focused mitigation strategies at actionable
process steps in a food operation is necessary to minimize or prevent
the significant vulnerabilities that are identified in a vulnerability
assessment (Ref. 21, Ref. 54, Ref. 58), regardless of the existence of
broad mitigation strategies. Although broad mitigation strategies are
important to further reduce the vulnerability for intentional
contamination, they are not sufficient to significantly minimize the
risk of intentional contamination caused by an act of terrorism because
broad mitigation strategies are not specific enough, for example, to
counter the actions of an attacker who has legitimate access to the
facility (i.e., insider attack) or an attacker who circumvents
perimeter protections (e.g., scaling a fence), with the goal of
intentionally contaminating the food. Focused mitigation strategies, on
the other hand, are targeted to actionable process steps identified in
a food operation to reduce the likelihood of intentional contamination
at those process steps and, therefore, are essential to ensure that
appropriate food defense measures are taken to protect the food from
intentional contamination caused by acts of terrorism. In contrast to
broad mitigation strategies, focused mitigation strategies are targeted
to actionable process steps and, therefore, are more effective at
countering an attacker who has legitimate access to the facility. We
have tentatively concluded that we will continue to encourage the
implementation of broad mitigation strategies on a voluntary basis, but
we will require the implementation of focused mitigation strategies at
actionable process steps. We request comment on this tentative
conclusion, and on whether we should include, in a final rule, a
requirement for the implementation of any broad mitigation strategies.
iii. Examples of focused mitigation strategies for FDA-identified
key activity types. For the FDA-identified key activity types, a
variety of focused mitigation strategies may be applicable, dependent
both on the food manufactured, processed, packed, or held at the
facility and on the practices and processes employed at that facility.
We list in this section some examples of focused mitigation strategies
that may be appropriate to implement at actionable process steps for
each of these four key activity types. While the decision of which and
how many focused mitigation strategies would be appropriate to employ
at an actionable process step is dependent upon the physical layout and
operation at a specific facility, the examples presented in the section
immediately below illustrate the decision-making process to identify
and determine appropriate focused mitigation strategies at an
actionable process step.
Bulk liquid receiving and loading--Examples of focused mitigation
strategies that may be appropriate include the following:
1. Controlling access to the receiving or loading area,
conveyances, and equipment, including hoses and pumping machinery, to
prevent an unauthorized person from gaining access to the food during
receiving or loading. Access controls may include: strategies to easily
identify authorized persons, such as color-coded uniforms or badges;
restricting conveyance drivers to areas away from the receiving or
loading area (e.g., restricting them to a lounge or break room);
securing hoses with locking caps or in cabinets; and ensuring that
conveyance access hatches, vents, and inspection ports are secured;
2. Ensuring adequate lighting in the receiving or loading area,
which reduces the ability of an attacker to disguise his or her
actions. Adequate lighting in and around vulnerable areas of a food
operation increases the likelihood that other staff will witness the
actions of an attacker and enable them to take steps to prevent or
react to contamination;
3. Increasing observation of the receiving or loading area, which
reduces the ability of an attacker to disguise his or her actions. For
example, maximizing the line of sight by removing boxes, crates, or
other obstructions from the area; positioning quality control personnel
in the receiving or loading area to supervise operations; or utilizing
closed-circuit TV systems or other monitoring devices;
4. Verifying that seals on a shipping conveyance are intact prior
to receiving or after loading a bulk liquid to reduce the likelihood
that the shipping conveyance was or is accessed during transport to
introduce a contaminant into the product;
5. Establishing and implementing a policy for driver check-in and
identification to help confirm driver identity and verify the
individual is authorized, through verification of shipping
documentation or other means, to deliver or pick-up the shipment and
reduce the likelihood that an attacker could fraudulently pose as a
driver as a means of gaining access to the facility; and
6. Inspecting the shipping conveyance prior to loading bulk liquids
to help ensure that no contaminant has been introduced to the
conveyance chamber that could then contaminate the product once the
product is loaded.
Liquid storage and handling--Examples of focused mitigation
strategies that may be appropriate include the following:
1. Controlling access to liquid storage, holding, surge, or
metering tanks, similar to the strategies that may be applied for
controlling access to bulk liquid receiving and holding;
2. Ensuring that the area around liquid storage, holding, surge, or
metering tanks is free of unrelated materials, such as personal items
(backpacks, purses, or packages), and other items that are not directly
related to the food operation, to reduce the likelihood of a
contaminant being brought into the area for introduction into the tank;
3. Ensuring adequate lighting in and around liquid storage,
holding, surge or metering tanks, similar to the strategies that may be
applied for ensuring adequate lighting at bulk liquid receiving and
loading;
4. Installing one-way sample ports in liquid storage, holding,
surge, or metering tanks , so that food product can be drawn out of the
equipment but a contaminant cannot be inserted into the tank;
5. Inspecting tanks prior to filling to help ensure that no
contaminant has been introduced into the empty tank that could then
contaminate the product once loaded;
6. Inspecting pumping or metering equipment prior to use to help
ensure that no contaminant has been introduced into the equipment that
could contaminate the product;
7. Using enclosed tanks and transfer systems to move materials to
reduce the potential for an attacker to access the product and
introduce a contaminant; and
8. Positioning holding, surge, or metering tanks to increase
visibility, such that frequent observation is facilitated and
visibility of activity around the tank is improved. This
[[Page 78045]]
focused mitigation strategy may be less practical for longer term
storage tanks.
Secondary ingredient handling--Examples of focused mitigation
strategies that may be appropriate include the following:
1. Controlling access to ingredient handling areas, including where
secondary ingredients or rework are staged, prepared, or added to the
product stream, to prevent an unauthorized person from gaining access
to the ingredients or rework during these processes. As with other key
activity types, access controls may include strategies to easily
identify authorized persons, such as with color coded uniforms or
badges, or conducting ingredient handling activities in areas behind
locking gates, doors, or other barriers;
2. Ensuring the secondary ingredient handling area is free of
unrelated materials, such as personal items or other items not directly
related to the activity, to help ensure that a contaminant is not
brought into the area for introduction into the ingredient during
staging, preparation, or addition;
3. Ensuring adequate lighting and increasing visibility in and
around ingredient staging and handling areas, similar to the strategies
that may be employed to ensure adequate lighting at bulk liquid
receiving and holding;
4. Reducing staging time to reduce the opportunity for intentional
adulteration. Any time sealed or tamper-evident containers are breached
provides a potential opportunity for an attacker to introduce a
contaminant into the ingredient or rework. Reducing the time
ingredients and rework are staged in unsecured containers reduces the
opportunity for an attacker to adulterate the ingredient or rework;
5. Restricting secondary ingredient handling to senior staff to
reduce the accessibility and opportunity for intentional adulteration;
6. Using peer monitoring in the ingredient handling area, because
requiring at least two staff members to be in the area at any given
time during operations can reduce the opportunity for a contaminant to
be discreetly introduced into the food;
7. Using automated and enclosed ingredient handling equipment, such
as automated computer weighing, measuring, and addition equipment, to
reduce human contact with secondary ingredients or rework and thereby
reduce the opportunity for introduction of a contaminant; and
8. Inspecting secondary ingredients held in staging and
investigating any irregularities in the amount, condition, or
organization of items in secondary ingredient handling areas to
identify circumstances that suggest product contamination before a
contaminated ingredient is added to the product stream.
Mixing and similar activities--Examples of focused mitigation
strategies that may be appropriate include the following:
1. Controlling access to processing areas where mixing and similar
activities are conducted to prevent an unauthorized person from gaining
access to the product and equipment. Access controls may include:
strategies to easily identify authorized persons, such as with color
coded uniforms or badges; conducting these activities in areas behind
locking gates, doors, or other barriers; securing access to overhead
gangways and sampling platforms; and securing hatches, ports, and lids
with locks or access alarm devices;
2. Ensuring that the area is free of unrelated materials, such as
personal items and other items that are not directly related to the
activity, to reduce the likelihood of a contaminant being brought into
the area for introduction into the ingredient during mixing and similar
activities;
3. Ensuring adequate lighting and increasing visibility in and
around mixing and similar activities areas, similar to the strategies
that may be employed to ensure adequate lighting at bulk receiving and
loading;
4. Positioning mixing and similar equipment in a manner that
maximizes visibility, similar to the strategies that may be employed to
maximize visibility for liquid storage and handling;
5. Using one-way sample ports that prohibit introduction of a
contaminant into the mixing or similar equipment, similar to the
strategies that may be employed for liquid storage and handling;
6. Conducting inspections of mixing and similar equipment prior to
use to help ensure no contaminant has been introduced that could
contaminate the product once loaded;
7. Restricting mixing and similar activities to senior staff,
similar to the strategies that may be employed for secondary ingredient
handling;
8. Using peer monitoring in this area to ensure that at least two
staff members are in this area at any given time during operations,
reducing the opportunity for a contaminant to be discreetly introduced
into the food; and
9. Using automated, self-contained, enclosed equipment to reduce
human contact with the product and reduce the opportunity for
introduction of a contaminant.
These examples of focused mitigation strategies are consistent with
measures included in the MSD. The examples are not intended to be an
exhaustive list of appropriate focused mitigation strategies. For
additional guidance on identifying appropriate focused mitigation
strategies, see our guidance documents, the MSD, and other resources
(see section II.D of this document).
iv. Specific examples of determining appropriate focused mitigation
strategies. In this section, we discuss specific examples of the
decision-making process to identify and determine appropriate focused
mitigation strategies at an actionable process step for each of the
FDA-identified key activity types.
Bulk liquid receiving and loading--Unloading at Facility A's bulk
tanker truck unloading bay is an actionable process step for this key
activity type. Facility A has a significant vulnerability related to
access to the food during the unloading of the bulk liquid. At Facility
A, the tanker truck drives into the unloading bay without passing
through any security check-in procedures. A single facility employee is
assigned to this area and takes a facility-owned hose from an open
shelving unit in the unloading bay and attaches it to the tanker
truck's unloading port. The driver of the tanker truck assists in
unloading by opening the venting hatch at the top of the tanker truck
while the facility employee is attaching the hose. The driver then
waits in the unloading bay area while the truck is being unloaded. Upon
completion of unloading activities, the driver gets back in the truck
and exits the facility.
Facility A is not implementing focused mitigation strategies at
this actionable process step such that access to the food during
unloading of the bulk liquid is significantly minimized or eliminated.
The food is significantly vulnerable to an attacker (in this case,
potentially the driver, the facility employee, or a third party) who
could intentionally add a contaminant to the product to adulterate the
food. One approach for Facility A to significantly minimize or
eliminate the significant vulnerability at this actionable process step
is to implement the following focused mitigation strategies:
Establish a receiving check-in and verification procedure
to ensure that the shipment is being delivered by the proper firm and
that the driver is properly identified. The procedure would be
documented and maintained in a shipping log that records the key
identifying information about the driver, tanker truck, and shipping
[[Page 78046]]
documentation for the delivered product. The facility would also
institute a policy requiring that the shipping documentation include
the ID numbers of the seals on the unloading ports so that the facility
employee can verify that seal numbers match the shipping documentation
and that the seals were not broken, tampered with or replaced during
transport.
Implement a procedure to store hoses securely to reduce
the likelihood an attacker could add a contaminant to the hoses when
not in use. This would include storing hoses in locking cabinets and
placing end caps on the hoses. The facility also would issue keys only
to staff working in the tanker truck receiving bay and use a key
numbering and tracking system to verify that all keys are accounted
for.
Increase active observation of the unloading process to
reduce the likelihood of an attacker successfully introducing a
contaminant by requiring two or more production staff members to be
present during unloading activities (i.e., peer monitoring), or
requiring the bulk liquid unloading operations be overseen by a
supervisor or a member of the quality control staff. Alternatively, the
facility could employ video surveillance of the area. If the truck
driver is permitted to remain in the area of the receiving bay, the
introduction of active observation practices ensures that no
contaminant could be intentionally introduced to the product during
unloading activities. Alternatively, the facility could limit the
driver's access to the product by restricting the location of the
driver to designated areas outside the loading area while the truck is
being unloaded.
In this example, the focused mitigation strategies were selected to
achieve the following goals: Establishing the identity of personnel
with access to the food; ensuring that equipment that may be used to
introduce a contaminant is secured when not in use; and providing
active observation of activities at actionable process steps. By
implementing these focused mitigation strategies, the facility could
significantly minimize the significant vulnerability identified at the
actionable process step.
Liquid storage and handling--The storage of liquid in Facility B's
bulk liquid storage tank is an actionable process step for this key
activity type. Facility B's bulk storage tank holding a primary
ingredient is located within its building, and a significant
vulnerability relates to access to the food during such storage. In
Facility B, a network of gangways, ladders, and platforms surround the
bulk liquid storage tank so that personnel can gain access to a hatch
at the top of the tank. Facility B has a procedure for securing this
hatch with a lock, and the facility stores the key to the hatch in the
operations manager's office. To access a key, a worker must request the
key from the operations manager and justify the need to open the lock.
When an employee checks out the key, the manager's assistant records
the employee's name, time the key is checked out, and the reason.
Facility B's bulk liquid storage tank also has a second hatch along the
side which is used for cleaning the tank when empty and is not locked.
This secondary hatch is not accessible while product is in the tank
because it opens inward, and pressure from product in the tank prevents
the hatch from being opened when product is present.
In considering the requirement for focused mitigation strategies at
this actionable process step, Facility B would determine that it has
sufficient safeguards in place to significantly minimize the likelihood
of intentional adulteration from an attacker accessing the hatch on the
top of the bulk storage tank. However, the facility would identify the
secondary hatch as presenting a significant vulnerability for which
insufficient focused mitigation strategies are being implemented. While
food is in the tank, the secondary hatch is secure. However, when the
tank is empty after cleaning, there is an opportunity for an attacker
to introduce a contaminant into the tank via the secondary hatch which
would then contaminate the food when it is added to the tank. To
significantly minimize or eliminate the significant vulnerability
presented by the secondary hatch, the facility would implement focused
mitigation strategies to restrict and document access to the secondary
hatch as is done for the hatch on the top of the tank. To do this, the
facility would install a lock on the secondary hatch and incorporate
the key for the secondary hatch into its existing key management
system. Alternatively, the facility could implement a procedure of
monitoring the condition of the tank interior immediately prior to
reintroducing product to the tank. This monitoring check would be
recorded in a monitoring log.
Facility B already has in place some practices that we would
consider appropriate focused mitigation strategies. The procedures in
place to control access to the top access hatch on the bulk liquid
storage tank are sufficient to minimize the significant vulnerability
presented by this hatch. However, Facility B still has a significant
vulnerability associated with the secondary access hatch, which
required additional focused mitigation strategies to significantly
reduce or eliminate the risk of intentional contamination.
Another example of an actionable process step for the key activity
type ``Liquid Storage and Handling'' is liquid storage in a liquid
surge tank located above an in-line bottling operation at Facility C.
The surge tank is used to control the flow rate of liquid product into
the bottling equipment and is enclosed by an unlocked lid. A ladder and
walkway enable workers to access the surge tank as needed to monitor
product flow and take quality control samples. Facility C has an
operations control room, which is equipped with windows to view the
production floor. However, the view of the bottling operation from the
operations control room is commonly blocked by pallets of empty bottles
awaiting introduction into the bottling equipment.
It is not practical for Facility C to lock the surge tank lid
because workers need to frequently check the status of product flow and
take quality control samples. Also, it is not practical to physically
limit access to the ladder or walkway used to access the surge tank,
for the same reasons. One approach for Facility C to significantly
minimize or eliminate the significant vulnerability at this actionable
process step is to implement the following focused mitigation
strategies:
Implement a policy to prohibit all personnel not
associated with the bottling operation from entering the area and issue
uniforms of a particular color to the bottling personnel only. The
staff working in the bottling area would enforce this policy by
instructing any staff not associated with the bottling operation to
leave the area.
Prohibit staff working in the bottling area from bringing
any items not associated with the bottling operation into the work
area.
Train the staff working in the bottling area in a peer
monitoring program to be attentive to the activity of other staff in
the area.
Stage pallets of empty bottles awaiting introduction into
the bottling equipment in another location to improve line of sight
from the operations control room.
By implementing these focused mitigation strategies, the facility
could significantly minimize or eliminate the significant vulnerability
associated with the actionable process step at the liquid surge tank.
Secondary ingredient handling--Ingredient staging at Facility D is
an actionable process step for this key activity type. Facility D opens
a
[[Page 78047]]
containerized secondary ingredient's tamper evident package, measures
out the required amount into a secondary container, and pre-positions
the ingredient in the production area so that it is readily added to
the product line. Access to the food during each of these activities at
this actionable process step presents a significant vulnerability.
Facility D stages a dry, powdered ingredient near the mixer the night
before it is intended to be used so that it is ready when the
production run begins the next morning. Additionally, the staging area
in Facility D is accessible to all staff and is an open area on the
production floor.
One approach for Facility D to significantly minimize or eliminate
the significant vulnerability at this actionable process step is to
implement the following focused mitigation strategies:
Reduce staging time, by revising its procedures so that
ingredients are staged immediately before they are added into the
product stream. This strategy would reduce the time ingredients are
accessible.
Change its staffing procedures to ensure that only senior
or long-term employees are assigned to measuring and staging secondary
ingredients. Assigning the most trusted employees to work in sensitive
areas reduces the risk of intentional contamination.
Increase its observation of this area by installing
closed-circuit TV cameras to monitor the actions of staff in the
secondary ingredient staging area.
By its nature, the action of ingredient staging is an open and
accessible process step. Focused mitigation strategies must address
personnel access so that the likelihood of an intentional contamination
at this step is significantly reduced or eliminated. By implementing
these focused mitigation strategies, the facility could significantly
minimize the significant vulnerability identified at the actionable
process step.
Mixing and similar activities--Blending in Facility E's dough mixer
is an actionable process step for this key activity type. Facility E
operates a dough mixer to combine several dry and liquid ingredients.
This mixer is not enclosed and is located in an open area of the
facility where it is under regular--though not dedicated--human
observation. While a batch of product is being mixed, the staff member
assigned to the mixer may leave the area to retrieve and prepare
ingredients for the next production batch. The line of sight in this
area is clear, and management in the operations control room located
above the production floor has a clear view of the mixer through an
observation window.
The mixer is vulnerable to an attacker who could intentionally
introduce a contaminant into the food because of the open nature of the
mixer, the lack of constant and dedicated observation, and the lack of
physical access control to the area where it is located. One approach
for Facility E to significantly minimize or eliminate the significant
vulnerability at this actionable process step is to implement the
following focused mitigation strategies:
Install a lid on the mixer that must be opened to add
anything to the mixer. If Facility E determines that it would be
disruptive to the production schedule to install a lock on the lid, the
facility could install an access alarm that would indicate that the lid
has been opened. This alarm would sound in the operation control room
where a manager supervises production operations.
Assign another member of staff the responsibility of
preparing and securely staging ingredients for later production
batches. This would alleviate the need for the mixer operator to leave
the area, leaving the mixer unattended.
With the introduction of these two focused mitigation strategies,
the facility would have taken steps to enclose the mixer, making it
more difficult for an attacker to introduce a contaminant without
alerting management (by the sounding of the alarm), and increased the
dedicated observation of this otherwise vulnerable process step by
ensuring that the mixer operator is not required to leave the area
unattended.
Mixing at Facility F's rotating air dryer is another example of an
actionable process step for the key activity type ``Mixing and similar
activities.'' In Facility F, product, such as crackers or breakfast
cereals, are fed through drum-like equipment, where warm air is blown
across it while the drum rotates. Although the goal of this process is
to dry the product, it also could distribute any contaminant introduced
into the dryer evenly across the product. Facility F's rotating air
dryer is located alongside a commonly used walkway, but is behind a
guard rail to prevent employees from coming in contact with the hot
exterior of the dryer. Product is fed into the top of the dryer via a
pneumatic conveyor. There is sufficient space between the dryer opening
and the pneumatic conveyor discharge to enable an attacker to introduce
a contaminant to the dryer at this point. That opening is about six
feet above the ground, accessible from the floor of the facility.
Product leaves the dryer through a gravity fed line. The connection
between the dryer and the discharge line is sealed.
To goal of focused mitigation strategies at this actionable process
step would be to reduce access to this equipment to significantly
reduce the likelihood an attacker could introduce a contaminant into
the rotating air dryer. One way Facility F could do this would be to
install a clear plastic shield that would be affixed to and extend from
the discharge of the pneumatic conveyor to the opening of the dryer
where it would also be tightly affixed to the housing of the dryer. A
clear plastic shield would enable workers to supervise the product flow
into the dryer while posing as an effective barrier to an attacker
wishing to introduce a contaminant into the product at the dryer. This
engineering improvement would significantly minimize or eliminate
access to the food in the dryer and thereby significantly reduce or
eliminate the likelihood of a successful act of intentional
adulteration at this process step. The installation of physical
barriers to access of equipment at actionable process steps can be one
of the most effective focused mitigation strategies because it does not
require restricting personnel or maintaining active observation of an
area. The implementation of this engineering improvement would be
detailed in the facility's food defense plan.
c. Proposed Sec. 121.135(a)--Requirement to identify and implement
focused mitigation strategies for actionable process steps. Proposed
Sec. 121.135(a) would require that the owner, operator, or agent in
charge of a facility identify and implement focused mitigation
strategies at each actionable process step to provide assurances that
the significant vulnerability at each step will be significantly
minimized or prevented and the food manufactured, processed, packed or
held by such facility will not be adulterated under section 402 of the
FD&C Act. Under Sec. 121.135, we are proposing that, for each of the
identified actionable process steps, the owner, operator, or agent in
charge of a facility covered by this rule identify and implement
focused mitigation strategies. Focused mitigation strategies would be
required only for actionable process steps.
Because a focused mitigation strategy that would be necessary at an
actionable process step must be tailored to address the significant
vulnerability applicable to the specific actionable process step, we
are not proposing to specify the particular focused mitigation
strategies that would be appropriate. Rather, we expect the owner,
operator, or agent in charge of the facility covered by this
[[Page 78048]]
rule to identify the specific focused mitigation strategy(s) that would
be appropriate, considering the facility and food it produces, and to
ensure the proper implementation of those strategies to provide
assurances that the significant vulnerability at each identified
actionable process step is significantly minimized or prevented and the
food is not adulterated. In section V.C.3.b of this document, we list
examples of focused mitigation strategies and describe scenarios for
determining appropriate focused mitigation strategies at actionable
process steps for each of the FDA-identified key activity types.
A facility would have the flexibility to identify and implement
focused mitigation strategies from among all procedures, practices, and
processes available to the facility that would provide the assurances
that would be required by proposed Sec. 121.135. The flexibility
provided under this proposed provision acknowledges the existing
expertise within the food industry in this regard, and recognizes the
complex and varied nature of operations in food facilities.
Additionally, to the extent facilities may already be engaging in
practices that constitute focused mitigation strategies, facilities
should consider whether those measures satisfy the requirements of
proposed Sec. 121.135, such that the implementation of additional
focused mitigation strategies may not be necessary. (Note that
associated requirements, such as monitoring and verification, would
apply).
FDA's existing guidance documents and other resources (discussed in
section II.D of this document) include guidance for industry on a range
of focused mitigation strategies. In particular, the MSD includes a
list of mitigation strategies that can be applied to different steps in
a food operation to reduce the risk of intentional adulteration. The
database is searchable by key words and processing steps common to food
operations (e.g., packing, manufacturing, processing and holding).
Proposed Sec. 121.135(a) implements the provisions in sections
418(c)(2) and 420(b)(2) of the FD&C Act. FDA requests comments on our
analysis and proposed provisions related to mitigation strategies
necessary to protect against intentional adulteration of food caused by
acts of terrorism. We also seek input on whether and, to what extent,
facilities currently employ broad mitigation strategies and focused
mitigation strategies.
d. Proposed Sec. 121.135(b)--Requirement for written focused
mitigation strategies. Proposed Sec. 121.135(b) would require that
focused mitigation strategies for actionable process steps be written.
The focused mitigation strategy(ies) selected for each actionable
process step identified in accordance with proposed Sec. 121.130, and
a justification for how the strategy significantly reduces or
eliminates the risk of intentional adulteration at that actionable
process step(s) must be documented. Similar to preventive controls in a
food safety plan, written focused mitigation strategies in a food
defense plan are essential for the facility to implement the focused
mitigation strategies consistently, and essential for the facility and
inspectors. Written focused mitigation strategies also would be
essential for training purposes and during reanalysis and updates of
the focused mitigation strategies.
Proposed Sec. 121.135(b) implements the provisions in sections
418(h) and 420(b)(2) of the FD&C Act.
e. Proposed Sec. 121.135(c)--Applicability of monitoring,
corrective actions, and verification. Proposed Sec. 121.135(c) would
specify that the focused mitigation strategies required under this
section would be subject to monitoring as would be required by proposed
Sec. 121.140; corrective actions as would be required by proposed
Sec. 121.145; and verification as would be required by proposed Sec.
121.150. Proposed Sec. 121.135(c)(1) through (c)(3) would restate the
requirements of proposed Sec. Sec. 121.140, 121.145, and 121.150 to
clearly communicate the applicability of proposed Sec. Sec. 121.140,
121.145, and 121.150 to the focused mitigation strategies that would be
required under proposed Sec. 121.135 and would establish no new
requirements.
4. Monitoring
a. General description of monitoring. Proposed Sec. 121.3 would
define ``monitor'' to mean ``to conduct a planned sequence of
observations or measurements to assess whether focused mitigation
strategies are consistently applied and to produce an accurate record
for use in verification.'' In developing the proposed monitoring
requirements related to food defense, we considered our proposed
monitoring requirements related to food safety, which are described in
section XII.E of the PC proposed rule. For the same reasons outlined in
the PC proposed rule, we have tentatively concluded that monitoring is
necessary to establish the performance of the implementation of the
focused mitigation strategies. The proposed provisions in Sec. 121.140
implement section 418(h) of the FD&C Act.
b. Proposed Sec. 121.140(a)--Requirement for written procedures
for monitoring. Proposed Sec. 121.140(a) would require that the owner,
operator, or agent in charge of a facility establish and implement
written procedures, including the frequency with which they are to be
performed, for monitoring the focused mitigation strategies. Monitoring
the performance of focused mitigation strategies at specified
frequencies would facilitate tracking the implementation of the focused
mitigation strategies to provide assurance that they are consistently
applied in a facility covered by this rule. If monitoring shows that a
focused mitigation strategy is frequently not implemented, a facility
can consider whether another focused mitigation strategy would be more
appropriate. For example, if an ingredient storeroom door is to be kept
locked when not in use, but the door is frequently left unlocked
because access to the room is needed for other purposes, the facility
may replace the previous focused mitigation strategy with video
monitoring. Further, if monitoring is conducted with sufficient
frequency, it will detect if a focused mitigation strategy is not
properly implemented (e.g., if access to a particular area of a
facility is not being appropriately restricted or a bulk liquid tank is
not being visually inspected prior to filling), indicating a problem
and signaling the need for an appropriate corrective action. In
addition, the proposed monitoring requirement would result in written
documentation for use in verification.
c. Proposed Sec. 121.140(b)--Frequency of monitoring. Proposed
Sec. 121.140(b) would require that the owner, operator, or agent in
charge of a facility monitor the focused mitigation strategies with
sufficient frequency to provide assurances that they are consistently
applied. Proposed Sec. 121.140(b) does not specify a single monitoring
frequency applicable to all facilities and processes. Rather, it
requires monitoring with ``sufficient frequency'' to ensure that the
focused mitigation strategies are consistently applied in a facility
covered by this rule. We note that for food defense that many focused
mitigation strategies may be monitored over longer timeframes (non-
continuous monitoring) than preventive controls for food safety, which
are often monitored continuously. In large part preventive controls for
food safety are monitored continuously because they relate to physical
or chemical parameters of the process, such as the temperature of a
pasteurizer, which both lend themselves
[[Page 78049]]
to continuous monitoring and necessitate that level of monitoring to
ensure that the process is under control. As discussed in greater
detail in section V.C.3 of this document, most focused mitigation
strategies for food defense are not related to physical or chemical
parameters of the process. They tend to have more in common with
sanitation preventive controls for food safety in that they relate to
conditions around the food process, such as access to the equipment. A
focused mitigation strategy such as ``adequate lighting at an
actionable process step'' or ``secure air vents on a cooling tank with
one-way valves'' would not require continuous monitoring. Management
may choose to monitor lighting on a weekly basis to ensure that
everything is working properly and monitoring of the security of air
vents with one-way valves on a cooling tank might be done monthly.
Frequency is not prescribed in this proposed rule. More frequent (e.g.,
daily) monitoring would be appropriate for mitigation strategies that
relate to conditions or practices that are more likely to change more
rapidly, such as keeping the access door to an actionable process step
closed when not in use or ensuring that employees with color coded
uniforms are staying in the areas designated by the color code.
d. Proposed Sec. 121.140(c)--Requirement for records. To implement
section 418(g) of the FD&C Act, proposed Sec. 121.140(c) would require
that all monitoring of focused mitigation strategies in accordance with
this section must be documented in records that are subject to
verification in accordance with Sec. 121.150(a) and records review in
accordance with proposed Sec. 121.150(c).
The monitoring records would be used to verify that the focused
mitigation strategies are being monitored, as would be required by
proposed Sec. 121.150(a), and to verify that the focused mitigations
strategies are consistently implemented and are effective at
significantly minimizing or preventing the significant vulnerabilities,
as would be required by proposed Sec. 121.150(c). Further, they are
necessary to facilitate regulatory review of the system of controls.
Together, proposed Sec. Sec. 121.140(a), (b), and (c) and 121.150(a),
(c), and (e) would establish a system that would provide assurances
that the significant vulnerabilities identified for a food operation
are being significantly minimized or prevented.
5. Corrective Actions
a. General description of corrective actions. When a HACCP-type
system is applied to ensure food safety, the term ``corrective
actions'' is used to describe procedures that are in place to correct
the cause of a deviation to ensure that a critical control point is
under control and to ensure that the product produced under that
deviation is safe, since total adherence to a planned process may not
always occur. This concept is discussed in detail in section XII.F of
the PC proposed rule.
This same concept can be applied to the control of intentional
adulteration related to acts of terrorism. Monitoring may detect a
deviation from implementation of a focused mitigation strategy;
corrective actions are implemented to re-establish control. In
developing the proposed corrective actions requirements related to food
defense, we considered our proposed relevant requirements related to
food safety. The proposed provisions in Sec. 121.145 implement
sections 418(e), 418(h), and 420(b)(2) of the FD&C Act.
b. Proposed Sec. 127.145(a)--Corrective action procedures.
Proposed Sec. 121.145(a)(1) would require that the owner, operator, or
agent in charge of a facility establish and implement written
corrective action procedures that must be taken if focused mitigation
strategies are not properly implemented. Having written procedures in
place would enable facilities covered by this rule to act quickly and
appropriately when focused mitigation strategies are not properly
implemented--e.g., a situation where a work station at an actionable
process step requires two staff at all times in a ``buddy system'' but
is only staffed by one person for a period of time.
The benefits of identifying corrective action procedures before
corrective action is needed largely derive from having written
procedures. Written corrective action procedures would be essential to
the facility's management, to auditors, and to inspectors. The
facility's management will be responsible for ensuring that appropriate
corrective actions are taken if focused mitigation strategies are not
properly implemented. Having access to appropriate, written corrective
action procedures determined in advance of the need for such action can
ensure that correct and complete actions are taken in a timely fashion.
Having written corrective action procedures available for auditors and
for inspectors is essential for them to assess the adequacy of the food
defense plan; the procedures a facility will use to address
implementation failures are essential to proper, consistent
implementation, and without them a complete assessment cannot be made.
Written corrective action procedures also will be useful for training
purposes, so that employees who would need to implement the corrective
action procedures will be prepared for what they would need to do.
Proposed Sec. 121.145(a)(2) would require that corrective action
procedures describe the steps to be taken to ensure that appropriate
action is taken to identify and correct a problem with implementation
of a focused mitigation strategy to reduce the likelihood that the
problem will recur. In the previous example in which two staff are
required to be at a work station at all times, the corrective action
could be speaking with the employees to ensure they understand the
importance of remaining at the work station together, sending staff to
a refresher course on food defense awareness, and ensuring that the
supervisor knows that there must be adequate staff present on a shift
so two people can be at the work station at all times. If the problem
recurs, management may need to consider other measures for preventing
access at that process step.
c. Proposed Sec. 121.145(b)--Documentation. Proposed Sec.
121.145(b) would require that all corrective actions taken in
accordance with this section be documented in records that are subject
to verification in accordance with proposed Sec. 121.150(b) and
records review in accordance with proposed Sec. 121.150(c). The
records that document corrective actions would be used to verify that
appropriate decisions about corrective actions are being made and
appropriate corrective actions are being taken in facilities covered by
this rule.
d. Corrective actions proposed to be required by part 117 but not
part 121. Unlike in proposed part 117, in proposed part 121, we have
not proposed a requirement to ensure that all affected food is
evaluated for food safety if focused mitigation strategies are not
properly implemented or are found to be ineffective. An act of
intentional adulteration or attempted intentional adulteration has
historically been a rare event and, as a result, in the vast majority
of cases, the failure to properly implement a focused mitigation
strategy would not be expected to result in contaminated food. This is
because intentional adulteration requires not just the opportunity for
contamination (i.e., failure of a mitigation strategy to limit access
to an actionable process step), but also someone with intent to cause
harm at that same moment. In contrast, the failure to properly
implement a preventive control for a food safety hazard, such as proper
cook temperatures, is more likely to result in adulterated food (e.g.,
because the
[[Page 78050]]
pathogen reasonably likely to be present in the raw food would not be
eliminated from the food by the inadequate cooking process). However,
our decision not to propose these requirements does not absolve an
owner, operator, or agent in charge of a facility from their
responsibility to ensure that food is not adulterated. In addition,
food firms would continue to be subject to the reporting requirements
under section 417 of the FD&C Act. Moreover, the introduction or
delivery for introduction into interstate commerce of any food that is
adulterated is a prohibited act under section 301(a) of the FD&C Act.
The PC proposed rule also contains requirements for corrective
actions that must be taken in the event of an unanticipated problem.
Unlike in proposed part 117, in proposed part 121, we are not proposing
a requirement related to unanticipated problems because we are not
aware of circumstances where this would be relevant. Because of the
nature of the focused mitigation strategies, we expect that the
outcomes of monitoring will be binary, either the focused mitigation
strategy will be in place or it will not be in place. For this reason,
we expect that corrective action plans will be straightforward, with no
provision needed for unanticipated corrective actions. This contrasts
with the circumstances of food safety preventive measures, where
controls are often more complex, presenting opportunities for a more
nuanced corrective action, which may not be possible to fully
anticipate in advance.
We ask for comment on our rationale and tentative conclusion not to
propose these requirements.
6. Verification
a. General description of verification. In the preventive controls
framework, ``verification'' involves activities that help determine
whether the focused mitigation strategies are valid and are implemented
according to the food defense plan. Verification includes confirming
that monitoring and corrective actions are being implemented as
planned, through review of records and periodic reanalysis of the food
defense plan. This concept as applied to food safety is discussed in
detail in section XII.G of the PC proposed rule.
We have tentatively concluded that this same concept applies to the
control of intentional adulteration related to acts of terrorism.
Efforts must be made to ensure that the system of mitigation strategies
is in place and functioning as designed. The proposed provisions in
Sec. 121.150 implement sections 418(f) and 420(b)(2) of the FD&C Act.
b. Proposed Sec. 121.150(a)--Verification of monitoring. Proposed
Sec. 121.150(a) would require that the owner, operator, or agent in
charge of a facility verify that monitoring is being conducted.
Verification of monitoring can be conducted in a number of ways. One
example of verification of monitoring is a periodic observation of the
monitoring activity, e.g., by a supervisor. Another example is an
independent test made by a person other than the person doing the
monitoring. For example, if a shift supervisor is assigned to check at
the end of each shift that chemicals are properly stored and secured,
another supervisor may be responsible for checking periodically (e.g.,
once a week) that this is occurring. In another example, if an alarm is
supposed to sound if a mixing tank is accessed without authorization
and the monitoring procedures provide for weekly testing of the alarm,
a supervisor may be responsible for performing the same test monthly to
ensure that the alarm and the monitoring procedure are both working
properly. Proposed Sec. 121.150(a) would not specify the verification
activities that must be conducted for monitoring. We request comment on
whether proposed Sec. 121.150(a) should do so, and if so, what
verification activities should be required.
c. Proposed Sec. 121.150(b)--Verification of corrective actions.
Proposed Sec. 121.150(b) would require that the owner, operator, or
agent in charge of a facility verify that appropriate decisions about
corrective actions are being made. An example of verification that
appropriate decisions about corrective actions are being made is
observation of the corrective actions being taken, e.g., by a
supervisor. Proposed Sec. 121.150(b) would not specify the
verification activities that must be conducted for corrective actions.
We request comment on whether proposed Sec. 121.150(b) should do so,
and if so, what verification activities should be required.
d. Proposed Sec. 121.150(c)--Implementation and effectiveness.
Proposed Sec. 121.150(c) would require that the owner, operator, or
agent in charge of a facility verify that the focused mitigation
strategies are consistently implemented and are effectively and
significantly minimizing or preventing the significant vulnerabilities.
As appropriate to the facility and the food, this must include review
of the monitoring and corrective action records within appropriate
timeframes to ensure that the records are complete, the activities
reflected in the records occurred in accordance with the food defense
plan, the focused mitigation strategies are effective, and appropriate
decisions were made about corrective actions.
Proposed Sec. 121.150(c) would establish that the purpose of the
review of records is to ensure that the records are complete, the
activities reflected in the records occurred in accordance with the
food defense plan, the focused mitigation strategies are effective, and
appropriate decisions are made about corrective actions. We tentatively
conclude that review of the records required by proposed Sec.
121.150(c) would accomplish these purposes. Reviewing monitoring
records can reveal whether they contain information on all of the
activities or measures that were to be monitored to determine whether a
focused mitigation strategy is being consistently implemented in
accordance with the food defense plan. For example, a review of
monitoring records can show if the shift supervisor is consistently
storing and securing chemicals at the end of each shift as may be
required by a food defense plan. Review of monitoring records also can
reveal whether any information is missing--e.g., a date or time--so
that the missing information can be quickly identified and added to the
record if necessary.
Review of records also can reveal whether appropriate decisions
were made about corrective actions. The review would determine whether
all the corrective action procedures required by proposed Sec. 121.145
have been followed to prevent recurrence of the problem. For example,
in the previous example on corrective actions, a review of records
could reveal that the supervisor spoke to the staff about always having
two staff present at the work station as required in the food defense
plan and, as appropriate, enrolled the staff in a refresher course on
food defense awareness.
Proposed Sec. 121.150(c) would require review of the monitoring
and corrective action records within an appropriate time after the
records are made. We are not proposing to require review of records
within a specified timeframe. While the PC proposed rule contains a
requirement that monitoring and corrective action records be reviewed
within a week after the records are made, in the case of food defense,
we do not believe specifying a timeframe for records review is
necessary. As discussed previously, some focused mitigation strategies
may be monitored less frequently than are preventive controls for food
safety. In a HACCP-
[[Page 78051]]
type system for food safety, monitoring and corrective action records
are often reviewed a short time after their creation to enable action
to be taken relative to food that may be adulterated (e.g., recall). It
is unlikely that an improperly implemented focused mitigation strategy
would result in adulterated food (i.e., because adulteration of food
would require not only opportunity but also a simultaneous intent to
cause adulteration). A focused mitigation strategy such as ``adequate
lighting at the bulk truck unloading bay'' or ``secure air vents on a
cooling tank with one-way valves'' may be monitored on a weekly or
monthly basis. Because the focused mitigation strategies may be
monitored less frequently and because these frequencies may vary
significantly from one focused mitigation strategy to another, we
believe it is appropriate for owners, operators, or agents in charge of
a facility to determine when review of the monitoring and corrective
action records is best performed.
e. Proposed Sec. 121.150(d)--Reanalysis. To implement section
418(i) of the FD&C Act, proposed Sec. 121.150(d)(1) would require that
the owner, operator, or agent in charge of a facility conduct a
reanalysis of the food defense plan as follows:
1. At least once every 3 years (proposed Sec. 121.150(d)(1)(i)).
2. Whenever a significant change is made in the activities
conducted at a facility operated by such owner, operator, or agent in
charge if the change creates a reasonable potential for a new
vulnerability or a significant increase in a previously identified
vulnerability (proposed Sec. 121.150(d)(1)(ii)). For example, if a
facility adds a new product line, then the food defense plan must be
reanalyzed to consider whether it includes one of the key activity
types, and, if so to implement appropriate focused mitigation
strategies.
3. Whenever such owner, operator or agent in charge becomes aware
of new information about potential vulnerabilities associated with the
food operation or facility (proposed Sec. 121.150(d)(1)(iii)). For
example, an owner, operator, or agent in charge of a facility may
become aware that access to a particular piece of equipment is greater
than was thought to be the case when they initially considered whether
a key activity type is applicable to their food process.
4. Whenever a focused mitigation strategy is found to be
ineffective (proposed Sec. 121.150(d)(1)(iv)). Proposed Sec.
121.150(d)(1)(iv) would require that the owner, operator, or agent in
charge of a facility reanalyze the food defense plan to determine
whether modification of the plan is required if a focused mitigation
strategy is found to be ineffective. For example, if the owner,
operator, or agent in charge of a facility finds that color coding of
employee hard hats according to their assigned work stations or areas
is not effective in preventing employees from crossing into areas where
they are not assigned because employees have found that adhering to the
system adversely affects product, the owner, operator, or agent in
charge may need to consider other focused mitigation strategies to
ensure that staff access at actionable process steps is controlled.
5. Whenever FDA requires reanalysis to respond to new
vulnerabilities and developments in scientific understanding including,
as appropriate, results from a DHS biological, chemical, radiological,
or other terrorism risk assessment (proposed Sec. 121.150(d)(1)(v)).
Risk assessments or vulnerability assessments conducted by DHS or
others may reveal a significant vulnerability in process steps in
addition to the significant vulnerabilities associated with the key
activity types that FDA has identified. FDA would require reanalysis of
food defense plans, as necessary, to respond to any new knowledge about
threats or vulnerabilities to food operations based on information
available to the agency. This requirement for reanalysis could involve
a requirement to consider whether a new key activity type is relevant
to a facility's food processes. It could also involve a requirement to
reconsider existing key activity types in light of a credible threat of
terrorist attack on a specific food type, product, brand, or company.
Proposed Sec. 121.150(d)(2) would require that the owner,
operator, or agent in charge of a facility complete the required
reanalysis and implement any additional focused mitigation strategies
needed to address the significant vulnerabilities identified, if any,
before the change in activities at the facility is operative or, when
necessary, during the first six weeks of production. The purpose of the
reanalysis is to identify the need for, and implement, focused
mitigation strategies in light of a reasonable potential for a new
significant vulnerability, or a significant increase in a previously
identified significant vulnerability.
Proposed Sec. 121.150(d)(3) would require that the owner,
operator, or agent in charge of a facility revise the written plan if a
significant change is made or document the basis for the conclusion
that no additional or revised focused mitigation strategies are needed.
It is important to document that a reanalysis has been conducted and
the plan has been revised accordingly or that no change has been made.
Such documentation demonstrates that a facility has considered all
relevant information on the defense of the operation, including new
information that has become available since the last analysis. The
documentation further demonstrates that appropriate changes have been
made or that current procedures for implementing focused mitigation
strategies are adequate to significantly minimize or prevent
significant vulnerabilities.
f. Proposed Sec. 121.150(e)--Requirement for records for
verification. To implement sections 418(g) and 420(b)(2) of the FD&C
Act, proposed Sec. 121.150(e) would require that all verification
activities taken in accordance with this section be documented in
records.
g. Verification proposed to be required by part 117 but not part
121. In the PC proposed rule, we proposed to require, as part of
verification, the validation of the adequacy of the preventive controls
implemented to control the hazards identified in the hazard analysis as
reasonably likely to occur. In this proposed rule, we are not including
a similar proposed requirement. Unlike preventive controls, which often
involve processing parameters that can be scientifically validated,
focused mitigations strategies for food defense (which correspond to
preventive controls for food safety) often are not of a nature that
they can be scientifically validated. For example, it would not be
practical for a facility to attempt to validate the effectiveness of a
lock on a tank or the use of a `buddy system' at a particular process
step to prevent or significantly minimize intentional adulteration of
food caused by a terrorist attack. Most of the recommended mitigation
strategies in the MSD (Ref. 30) are similar in nature to the two
mentioned in the example above in that validation would be impractical.
Therefore, we have tentatively concluded not to propose a requirement
for validation of focused mitigation strategies.
However, if a facility chooses to use a processing parameter (e.g.,
thermal kill step) as a focused mitigation strategy, the facility
should employ such a processing parameter if it has been demonstrated
to be effective in significantly minimizing or preventing the
associated significant vulnerability. In many circumstances it is not
appropriate to use such strategies
[[Page 78052]]
because they are usually effective against one or several, but not all,
potential contaminants. See section XII.G of the PC proposed rule for
additional discussion of validation.
The PC proposed rule also includes proposed requirements for
calibration of process monitoring instruments and verification
instruments and also records associated with these activities. As
discussed previously, it is our expectation that most of the focused
mitigation strategies will not be continuously monitored and will not
require process monitoring instruments or instruments to verification
purposes. Therefore, we do not believe it would be necessary to include
those requirements in this part.
We ask for comment on our tentative decision not to include
validation of the focused mitigation strategies and calibration of
monitoring and verification instruments in codified requirements in
proposed Sec. 121.150.
7. Training of Personnel
Proposed Sec. 121.160 would establish requirements related to
training of certain personnel working in a food operation. Proposed
Sec. 121.160(a) would require that personnel and supervisors assigned
to actionable process steps receive appropriate training in food
defense awareness and their respective responsibilities in implementing
focused mitigation strategies. Because the effectiveness of a
mitigation strategy, which is applied at an actionable process step, is
dependent on the proper implementation by personnel and supervisors of
the strategy, we are proposing to require that personnel and
supervisors assigned to actionable process steps be appropriately
trained in food defense. The purpose of training a supervisor, in
addition to personnel at actionable process steps, is so that the
supervisor can help train employees, recognize conditions that could
lead to intentional contamination, and take necessary actions to
correct those conditions.
We are proposing that training required under this provision must
cover food defense awareness and the respective responsibilities of
personnel and supervisors assigned to actionable steps in implementing
focused mitigation strategies. At a minimum, such training must include
the general principles of food defense, including simple procedures for
employees to follow to adhere to those principles in their jobs. We
have tentatively concluded that completion of FDA's training course on
Food Defense Awareness for the Front-line Employee (described in this
section of the document), which takes about 20 minutes to complete,
would be sufficient to satisfy this element of the proposed training
requirement. Additionally, training must contain specifics about the
actionable process steps where employees are working and their roles in
the proper implementation of the focused mitigation strategy(ies)
applied at those actionable process steps. Training on the application
of focused mitigation strategies, which is likely to be specific to
each facility or actionable process step, may be added to existing on-
the-job training programs or provided separately.
FDA has developed training tools that are available for use by the
industry. FDA revamped its online food defense courses in 2013, and the
revamped courses, entitled ``Food Defense 101'' (Ref. 27), address the
types of intentional contamination that have occurred in the United
States in recent years and reflect FDA's current thinking on how to
minimize the likelihood and impact of such incidents. The courses
included in Food Defense 101 are: (1) Food Defense Awareness for the
Food Professional; (2) Food Defense Awareness for the Front-line
Employee; (3) Food Defense Regulations; and (4) ALERT, for owners and
operators of food facilities. The course on Food Defense Awareness for
the Food Professional provides an understanding of food defense and
information for professionals in the food industry. The course modules
progress through food defense planning including broad mitigation
strategies, vulnerability assessments, focused mitigation strategies,
and food defense plans. The course on Food Defense Awareness for Front-
line Employees provides information specific to front-line workers and
simple procedures for these employees to follow in food defense. The
course on Food Defense Regulations presents an overview of the Public
Health Security and Bioterrorism Preparedness and Response Act of 2002
(the Bioterrorism Act), FSMA, and FDA's Reportable Food Registry.
Finally, the course on ALERT, which was developed by FDA to help
stakeholders better understand food defense and how food defense
applies to the food industry, provides specific examples of ways to
protect a firm from the threat of intentional contamination. FDA's Food
Defense 101 online courses are available free-of-charge on our Web site
at https://www.fda.gov/Food/FoodDefense/default.htm.
We expect these existing courses will assist industry to comply
with this training requirement, if finalized as proposed. We are also
aware of training seminars and programs offered by private sector
entities (Ref. 59, Ref. 60, Ref. 61, Ref. 62) that may also assist
industry to comply with this training requirement. We seek comment on
the adequacy of FDA's Food Defense 101 training materials, and whether
there is a need for revisions to these existing FDA courses or the
development of additional FDA training materials.
FDA also previously issued guidance documents for industry on food
defense (Ref. 22, Ref. 23, Ref. 24, Ref. 25, Ref. 26), which include
recommendations related to personnel training. In these guidance
documents, we recommended that all employees have training in food
defense awareness, including information on how to prevent, detect, and
respond to an intentional contamination incident at their facility. As
noted in these guidance documents, we recommended incorporating
periodic reminders of the importance of food defense procedures into
routine facility communications, such as brochures, staff meetings or
payroll stuffers. We further recommended that facilities encourage all
employees to report unusual or suspicious individuals or activities to
management. We reiterate these recommendations described in our
guidance documents. However, in this proposed rule, we are not
proposing to include additional specific training requirements to
reflect all of those recommendations. For example, although we are not
requiring that all employees at a facility receive training in food
defense, we recognize the importance of training as a measure to
protect against intentional adulteration of food and, therefore,
reiterate our recommendation that all personnel working in a food
operation receive training in food defense awareness. We request
comment on this issue, including on whether we should require, in a
final rule, that basic food defense awareness training be completed by
all employees at a facility. We also request comment on whether we
should require training to be repeated periodically, including when
significant changes are made to food defense plans.
Proposed Sec. 121.160(b) would require that all training received
in accordance with section Sec. 121.160 be documented in records.
Under proposed Sec. 121.305, records would include such information as
the date of the training, the topics covered, and the person(s)
trained. An example of records that would comply with proposed Sec.
121.160(b) is an attendance sheet with the date, list of those in
attendance, and the particular topics covered (such as an overview of
food defense principles or food defense
[[Page 78053]]
planning). The records required by proposed Sec. 121.160(b) would
enable a facility to track the training that personnel received,
thereby enabling identification of personnel that have the prerequisite
awareness training for an assignment at an actionable process step.
Such records could be used to document that a person has, as would be
required under proposed Sec. 121.160(a), successfully completed
training appropriate to the person's duties at an actionable process
step.
We recognize that industry has already begun to implement food
defense measures to meet certain industry standards, which include
guidelines for food defense training (Ref. 63, Ref. 33, Ref. 35). Our
proposed minimum requirements for training are consistent with these
standards, as well as with WHO recommendations for personnel training
in its guidance on food defense (Ref. 6). We seek comment on the
feasibility of our proposed training requirements, in light of the
current state of food defense awareness in the industry and available
training resources.
D. Requirements Applying to Records That Must Be Established and
Maintained
When a HACCP-type system is implemented for food safety, records
are a critical part of the system because they aid facilities in
compliance with the requirements, including all the elements of a food
safety plan as proposed in Part 117, and allow facilities to show, and
FDA to determine, compliance with the requirements. This concept is
discussed in detail in section XV of the PC proposed rule. We have
tentatively concluded that records are critical to protect food from
intentional adulteration caused by acts of terrorism.
In subpart D of proposed part 121, FDA is proposing to establish
requirements applying to records that must be established and
maintained according to the requirements of this proposed rule. This
subpart implements numerous provisions in section 418 of the FD&C Act,
including sections 418(a), (b)(3), (g), (h), and (n)(1)(A), as well as
section 420(b) of the FD&C Act.
1. Proposed Sec. 121.301--Records Subject to the Requirements of this
Subpart D
Proposed Sec. 121.301(a) would establish that, except as provided
by proposed Sec. 121.301(b), all records required by proposed subpart
C of part 121 would be subject to all requirements of proposed subpart
D. We have tentatively concluded that the requirements in subpart D
describing how records must be established and maintained, including
the general requirements, record retention requirements, and
requirements for official review and public disclosure, are applicable
to all records that would be required under subpart C. Such records
would aid facilities in compliance with the requirements of proposed
part 121, and allow facilities to show, and FDA to determine,
compliance with the requirements of part 121. The proposed requirements
of subpart D are discussed in this document.
Proposed Sec. 121.301(b) would establish that the requirements of
proposed Sec. 121.310 apply only to the written food defense plan and
is discussed in more detail in section V.D.3 of this document.
2. Proposed Sec. 121.305--General Requirements Applying to Records
Proposed Sec. 121.305 contains general requirements that would
apply to records that would be required under proposed part 121,
including the format for required records, the recording of actual
values and observations obtained during monitoring, when records must
be created, and information that must be included in each record.
a. Proposed Sec. 121.305(a). Proposed Sec. 121.305(a) would
require that the records be kept as original records, true copies (such
as photocopies, pictures, scanned copies, microfilm, microfiche, or
other accurate reproductions of the original records), or electronic
records. True copies of records should be of sufficient quality to
detect whether the original record was changed or corrected in a manner
that obscured the original entry (e.g., through the use of white-out).
Proposed Sec. 121.305(a) would provide flexibility for mechanisms for
keeping records while maintaining the integrity of the recordkeeping
system. The proposed requirement allowing true copies provides options
that may be compatible with the way records are currently being kept in
facilities.
Proposed Sec. 121.305(a) also would require that electronic
records be kept in accordance with part 11 (21 CFR part 11). Part 11
provides criteria for acceptance by FDA, under certain circumstances,
of electronic records, electronic signatures, and handwritten
signatures executed to electronic records as equivalent to paper
records and handwritten signatures executed on paper. The proposed
requirement clarifies and acknowledges that records required by
proposed part 121 may be retained electronically, provided that they
comply with part 11.
In the PC proposed rule, FDA tentatively concluded that it would be
appropriate to apply the requirements of part 11 to the records that
would be required to be kept under proposed part 117. However, we
requested comment on whether there are any circumstances that would
warrant not applying part 11 to records that would be kept under
proposed part 117. In section XV.C of that document, we provided
examples of circumstances in which we exempted records from the
requirements of part 11 (21 CFR 1.329(b)) to avoid the necessity of
establishing new recordkeeping systems as long as current practices
would satisfy the requirements of the Act. In the PC proposed rule, we
also asked for comment on whether we should allow additional time for
electronic records to be kept in accordance with part 11. We seek
similar comment with regard to circumstances that would warrant not
applying part 11 to records that would be kept under proposed part 121
and whether we should allow additional time for electronic records to
be kept in accordance with part 11. Comments should provide the basis
for any view that the requirements of part 11 are not warranted.
b. Proposed Sec. 121.305(b). Proposed Sec. 121.305(b) would
require that records contain the actual values and observations
obtained during monitoring. For example, monitoring of the locking of
an access door to an actionable process step could be recorded as
``locked'' or ``unlocked'' (or ``yes'' or ``no'') and the monitoring of
the presence of staff with only appropriate color uniforms in a
designated area could be recorded as ``100% staff (or 10 of 10 staff)
with blue uniforms'' or conversely ``80% staff (or 8 of 10 staff) with
blue uniforms'' in the case of an improperly implemented focused
mitigation strategy. In the case of an improperly implemented focused
mitigation strategy, it is important to document the extent to which
the strategy was incorrectly applied, as monitoring data can show a
trend toward loss of control at an actionable process step. So, in the
example in which 8 of 10 staff have blue uniforms, a facility may also
consider documenting what color the remaining two staff were wearing if
such information would be valuable in establishing a trend. If the
recording of numerical values is possible in the monitoring of a
focused mitigation strategy (e.g., if a facility is using a processing
parameter such as heat treatment), then the actual times and
temperatures or other appropriate processing data should be recorded.
c. Proposed Sec. 121.305(c), (d) and (e). Proposed Sec.
121.305(c), (d) and (e) would require that records be accurate,
indelible, and legible (proposed
[[Page 78054]]
Sec. 121.305(c)); be created concurrently with performance of the
activity documented (proposed Sec. 121.305(d)); and be as detailed as
necessary to provide a history of work performed (proposed Sec.
121.305(e)). Proposed Sec. 121.305(c) and (d) would ensure that the
records are useful to the owner, operator, or agent in charge of a
facility in complying with the requirements of proposed part 121, for
example, in documenting compliance with monitoring requirements and
verifying compliance with the food defense plan. These proposed
requirements would also ensure that the records would be useful to FDA
in determining compliance with the requirements of proposed part 121.
Proposed Sec. 121.305(e) would provide flexibility to facilities to
tailor the amount of detail to the nature of the record.
d. Proposed Sec. 121.305(f). Proposed Sec. 121.305(f) would
require that the records include the following: (1) The name and
location of the facility; (2) the date and time of the activity
documented; (3) the signature or initials of the person performing the
activity; and (4) where appropriate, the identity of the product and
the production code, if any. The name and location of the facility and
the date and time would allow the owner, operator, or agent in charge
of a facility (and, during inspection, an FDA investigator) to assess
whether the record is current, to identify when and where any deviation
occurred, and to track corrective actions. The signature of the
individual who made the observation would ensure responsibility and
accountability. In addition, if there is a question about the record, a
signature would ensure that the source of the record will be known.
Linking a record to a specific product (and, when applicable, the
production code) would enable the owner, operator, or agent in charge
of a facility covered by this rule to isolate product if there is a
question that food has been adulterated. We seek comment on the scope
and potential burden associated with these proposed requirements.
The proposed requirement (proposed Sec. 121.305(f)(4)) for the
identity of the product and production code, if any, is important in
the context of food safety, where the production of potentially
adulterated product may result from loss of control during processing,
such as an improper cook temperature, and a recall may be necessary. It
is also especially applicable for food safety in cases of continuous
monitoring, when the loss of control can be associated with a
particular product or production code. Consistent with the PC proposed
rule, we have qualified the proposed requirement to indicate that the
identity of the product and the production code should be included as
part of the record ``where appropriate.'' We note that, in many cases,
it will likely be more difficult to include this information for a
focused mitigation strategy. As noted in the discussion on monitoring
in section V.C.5 of this proposed rule, some focused mitigation
strategies may be monitored weekly or monthly. In that case, it may not
be appropriate to include all of the products and production codes that
may have been affected by an improperly implemented focused mitigation
strategy. Further, in many cases the identity of the product and the
production code will not be relevant because the monitoring will be
performed in the area surrounding one or more production lines, used
for one or more products, rather than of processing parameters on a
production line for a specific lot of product. On the other hand, if
control of processing parameters, such as pasteurization time and
temperature, are used as a focused mitigation strategy, it would be
appropriate to document the product and production code, if any, that
was being processed at the time of monitoring. The nature of the
focused mitigation strategy should drive the decision by an owner,
operator, or agent in charge of a facility regarding whether or not to
include the identity of the product and the production code, if any, in
records.
3. Proposed Sec. 121.310--Additional Requirements Applying to the Food
Defense Plan
Proposed Sec. 121.310 would require that the owner, operator, or
agent in charge of a facility sign and date the food defense plan upon
initial completion (proposed Sec. 121.310(a)) and upon any
modification (proposed Sec. 121.310(b)). Such a signature would
provide direct evidence of the owner, operator, or agent's acceptance
of the plan and commitment to implementation of the plan. Additionally,
the signature, along with the date of signing, would serve to minimize
potential confusion over the authenticity of any differing versions or
editions of the document that might exist.
4. Proposed Sec. 121.315--Requirements for Record Retention
Proposed Sec. 121.315 contains requirements on the length of time
records that would be required under proposed part 121 must be retained
and allowances for offsite storage of records under certain
circumstances.
a. Proposed Sec. 121.315(a) and (b). Proposed Sec. 121.315(a)
would require that all records that would be required by proposed part
121 be retained at the facility for at least 2 years after the date
they were prepared. Proposed Sec. 121.315(b) would require that the
food defense plan be retained at the facility for at least 2 years
after its use is discontinued (e.g., because the facility has updated
the written food defense plan. The 2-year timeframe for all records
required by proposed part 121 is consistent with the length of time
that nonperishable food products, on average, can be expected to be in
commercial distribution plus a reasonable time thereafter to ensure
that the records are available for verification activities. This
proposed requirement is similar to the proposed records retention
requirement in the PC proposed rule, which contains a discussion of
similar requirements found in other FDA regulations and in particular
the proposed and final rules implementing the recordkeeping
requirements of the Bioterrorism Act. This 2-year retention period
would run from either the date the record is prepared, for day-to-day
operational records, or the date at which use of the record is
discontinued, for the food defense plan. We seek comment on this
proposal.
b. Proposed Sec. 121.315(c). Proposed Sec. 121.315(c) would
provide that, except for the food defense plan, use of offsite storage
for records is permitted after 6 months following the date that the
record was made if such records can be retrieved and provided onsite
within 24 hours of request for official review. The food defense plan
would be required to remain onsite. FDA realizes that the proposed
requirements for recordkeeping could require some facilities to store a
significant quantity of records, and that there may not be adequate
storage space in the facility for all of these records. Providing for
offsite storage of most records after 6 months would enable a facility
to comply with the proposed requirements for record retention while
reducing the amount of space needed for onsite storage of the records
without interfering with the purpose of record retention, because the
records will be readily available.
Proposed Sec. 121.315(c) also would provide that electronic
records are considered to be onsite if they are accessible from an
onsite location. Computerized systems within corporations can be
networked, allowing for the sending and receiving of information in a
secure fashion to all of the different food processing facilities of
that corporation worldwide. This
[[Page 78055]]
type of system can be used to provide access at multiple locations to
records from multiple facilities.
c. Proposed Sec. 121.315(d). Proposed Sec. 121.315(d) would
provide that if the facility is closed for a prolonged period, the
records may be transferred to some other reasonably accessible location
but must be returned to the facility within 24 hours for official
review upon request. Allowing for transfer of records will give
practical storage relief to seasonal operations or those closed for
other reasons for prolonged periods.
5. Proposed Sec. 121.320--Requirements for Official Review
Proposed Sec. 121.320 would require that all records required by
proposed part 121 be made promptly available to a duly authorized
representative of the Secretary of Health and Human Services upon oral
or written request.
6. Proposed Sec. 121.325--Public Disclosure
Proposed Sec. 121.325 would establish that all records required by
proposed part 121 will be protected from public disclosure to the
extent allowable under part 20 of this chapter. Our general policies,
procedures, and practices relating to the protection of confidential or
otherwise protected information received from third parties would apply
to information received under this rule.
E. Compliance
Section 103(e) of FSMA amends section 301 of the FD&C Act (21
U.S.C. 331) by adding a new section--(uu)--to the list of acts and the
causing thereof that are prohibited. Under section 301(uu) of the FD&C
Act, the following act, and the causing thereof, are prohibited:
``[t]he operation of a facility that manufactures, processes, packs, or
holds food for sale in the United States if the owner, operator, or
agent in charge of such facility is not in compliance with section 418
[of the FD&C Act].'' To clearly communicate that failure to comply with
the regulations established under section 418 of the FD&C Act is a
prohibited act, proposed Sec. 121.401(a) in subpart E would establish
that the operation of a facility that manufactures, processes, packs,
or holds food for sale in the United States if the owner, operator, or
agent in charge of such facility is required to comply with, and is not
in compliance with, section 418 or subparts C or D of part 121 is a
prohibited act under section 301(uu) of the FD&C Act.
Section 106(d) of FSMA amends section 301 of the FD&C Act by adding
a new section--(ww)--to the list of acts and the causing thereof that
are prohibited. Under section 301(ww) of the FD&C Act, the following
act, and the causing thereof, are prohibited: ``[t]he failure to comply
with section 420 [of the FD&C Act].'' To clearly communicate that
failure to comply with the regulations established under section 420 of
the FD&C Act is a prohibited act, proposed Sec. 121.401(b) would
establish that the failure to comply with section 420 of the FD&C Act
or subparts C or D of part 121 is a prohibited act under section
301(ww) of the FD&C Act.
VI. Preliminary Regulatory Impact Analysis
A. Overview
FDA has examined the impacts of the proposed rule under Executive
Order 12866, Executive Order 13563, the Regulatory Flexibility Act (5
U.S.C. 601-612), and the Unfunded Mandates Reform Act of 1995 (Pub. L.
104-4). Executive Orders 12866 and 13563 direct Agencies to assess all
costs and benefits of available regulatory alternatives and, when
regulation is necessary, to select regulatory approaches that maximize
net benefits (including potential economic, environmental, public
health and safety, and other advantages; distributive impacts; and
equity). We believe that this proposed rule is a significant regulatory
action under Executive Order 12866.
B. Regulatory Flexibility Act
The Regulatory Flexibility Act requires Agencies to analyze
regulatory options that would minimize any significant impact of a rule
on small entities. The annualized costs per entity due to this proposed
rule are about $13,000 for a one-facility firm with 100 employees, and
there are about 4,100 small businesses that would be affected by the
proposed rule, so we tentatively conclude that the proposed rule could
have a significant economic impact on a substantial number of small
entities.
C. Small Business Regulatory Enforcement Fairness Act of 1996
The Small Business Regulatory Enforcement Fairness Act of 1996
(Pub. L. 104-121) defines a major rule for the purpose of congressional
review as having caused or being likely to cause one or more of the
following: An annual effect on the economy of $100 million or more; a
major increase in costs or prices; significant adverse effects on
competition, employment, productivity, or innovation; or significant
adverse effects on the ability of U.S.-based enterprises to compete
with foreign-based enterprises in domestic or export markets. In
accordance with the Small Business Regulatory Enforcement Fairness Act,
the Office of Management and Budget (OMB) has determined that this
proposed rule is a major rule for the purpose of congressional review.
D. Unfunded Mandates Reform Act of 1995
Section 202(a) of the Unfunded Mandates Reform Act of 1995 requires
that Agencies prepare a written statement, which includes an assessment
of anticipated costs and benefits, before proposing ``any rule that
includes any Federal mandate that may result in the expenditure by
State, local, and tribal governments, in the aggregate, or by the
private sector, of $100,000,000 or more (adjusted annually for
inflation) in any one year.'' The current threshold after adjustment
for inflation is $141 million, using the most current (2012) Implicit
Price Deflator for the Gross Domestic Product. We expect this proposed
rule may result in a 1-year expenditure that would meet or exceed this
amount.
E. Paperwork Reduction Act of 1995
This proposed rule contains information collection requirements
that are subject to review by the Office of Management and Budget (OMB)
under the Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501-3520).
A description of these provisions is given in the Description section
of this document with an estimate of the annual reporting,
recordkeeping, and third-party disclosure burden. Included in the
estimate is the time for reviewing instructions, searching existing
data sources, gathering and maintaining the data needed, and completing
and reviewing each collection of information.
FDA invites comments on: (1) Whether the proposed collection of
information is necessary for the proper performance of FDA's functions,
including whether the information will have practical utility; (2) the
accuracy of FDA's estimate of the burden of the proposed collection of
information, including the validity of the methodology and assumptions
used; (3) ways to enhance the quality, utility, and clarity of the
information to be collected; and (4) ways to minimize the burden of the
collection of information on respondents, including through the use of
automated collection techniques, when appropriate, and other forms of
information technology.
To ensure that comments on information collection are received, OMB
recommends that written
[[Page 78056]]
comments be faxed to the Office of Information and Regulatory Affairs,
OMB, Attn: FDA Desk Officer, FAX: 202-395-7285, or emailed to oira_submission@omb.eop.gov. All comments should be identified with the
title ``Focused Mitigation Strategies to Protect Food Against
Intentional Adulteration.''
In compliance with the Paperwork Reduction Act of 1995 (44. U.S.C.
3407(d)), the agency has submitted the information collection
provisions of this proposed rule to OMB for review. Interested persons
are requested to send comments regarding information collection by
January 23, 2014 to the Office of Information and Regulatory Affairs,
OMB. To ensure that comments on information collection are received,
OMB recommends that written comments be faxed to the Office of
Information and Regulatory Affairs, OMB, Attn: FDA Desk Officer, FAX:
202-395-6974, or emailed to oira_submission@omb.eop.gov. All comments
should be identified with the title, ``Focused Mitigation Strategies to
Protect Food Against Intentional Adulteration.''
F. Public Access to the Analyses
The analyses that we have performed to examine the impacts of this
proposed rule under Executive Order 12866, Executive Order 13563, the
Regulatory Flexibility Act (5 U.S.C. 601-612), the Unfunded Mandates
Reform Act of 1995 (Pub. L. 104-4), and the Paperwork Reduction Act of
1995 (44 U.S.C. 3501-3520) are available to the public in the docket
for this final rule (Ref. 64).
VII. Analysis of Environmental Impact
The Agency has determined under 21 CFR 25.30(h) that this action is
of a type that does not individually or cumulatively have a significant
effect on the human environment (Ref. 65). Therefore, neither an
environmental assessment nor an environmental impact statement is
required.
VIII. Federalism
FDA has analyzed this proposed rule in accordance with the
principles set forth in Executive Order 13132. FDA has determined that
the proposed rule, if finalized, would not contain policies that would
have substantial direct effects on the States, on the relationship
between the National Government and the States, or on the distribution
of power and responsibilities among the various levels of government.
Accordingly, the Agency tentatively concludes that the proposed rule
does not contain policies that have federalism implications as defined
in the Executive order and, consequently, a federalism summary impact
statement is not required.
IX. Comments
We invite public comment on the matters specified in this document
as well as any other matters concerning this proposed rule that are of
interest. Interested persons may submit either electronic comments
regarding this document to https://www.regulations.gov or written
comments to the Division of Dockets Management (see ADDRESSES). It is
only necessary to send one set of comments. Identify comments with the
docket number found in brackets in the heading of this document.
Received comments may be seen in the Division of Dockets Management
between 9 a.m. and 4 p.m., Monday through Friday, and will be posted to
the docket at https://www.regulations.gov.
X. References
The following references have been placed on display in the
Division of Dockets Management (see ADDRESSES) and may be seen by
interested persons between 9 a.m. and 4 p.m., Monday through Friday.
(FDA has verified the Web site addresses, but FDA is not responsible
for any subsequent changes to the Web sites after this document
publishes in the Federal Register.)
1. Kennedy, S.K. and F.F. Busta, ``Chapter 5 Biosecurity: Food
Protection and Defense,'' Food Microbiology: Fundamentals and
Frontiers, Edited by M.P. Doyle and L.R. Beuchat, American Society
for Microbiology Press: Washington, DC, pp. 87-102, 2007. Accessed
October 30, 2013.
2. Khan A.S., D.L. Swerdlow, and D.D. Juranek, ``Precautions
Against Biological and Chemical Terrorism Directed at Food and Water
Supplies,'' Public Health Reports, 116(1):3-14, 2001.
3. Sobel, J., A.S. Khan, and D.L. Swerdlow, ``Threat of a
Biological Terrorist Attack on the US Food Supply: The CDC
Perspective,'' The Lancet, 359(9309):874-880, March 9, 2002.
4. T[ouml]r[ouml]k, T.J., R.V. Tauxe, R.P. Wise, et al., ``A
Large Community Outbreak of Salmonellosis Caused by Intentional
Contamination of Restaurant Salad Bars,'' Journal of American
Medical Association, 278(5):389-395, August 1997.
5. British Standards Institute and Centre for the Protection of
National Infrastructure. ``Publicly Available Specification 96:2010
Defending Food and Drink,'' March 2010. https://www.cpni.gov.uk/documents/publications/non-cpni_pubs/pas96_vis14.pdf. Accessed
September 25, 2013.
6. World Health Organization. ``Terrorist Threats to Food:
Guidance for Establishing and Strengthening Prevention and Response
Systems,'' Food Safety Issues, Revision May 2008. https://www.who.int/foodsafety/publications/general/en/terrorist.pdf.
Accessed September 23, 2013.
7. Everstine, K., S. Kennedy, and J. Spink, ``Economically
Motivated Adulteration (EMA) of Food: Common Characteristics of EMA
Incidents,'' Journal of Food Protection, 76(4):723-735, 2013.
8. U.S. Food and Drug Administration. ``Economically Motivated
Adulteration; Public Meeting; Request for Comment,'' Federal
Register, 74(64):15497-15499, 2009. https://www.gpo.gov/fdsys/pkg/FR-2009-04-06/pdf/E9-7843.pdf. Accessed September 23, 2013.
9. Spink, J. and DC Moyer, ``Defining the Public Health Threat
of Food Fraud,'' Journal of Food Science, 75(9):R157-R163, 2011.
10. Ingelfinger, J.R., ``Melamine and the Global Implications of
Food Contamination,'' New England Journal of Medicine, 359(26):2745-
2748, 2008.
11. Xiu, C. and K.K. Klein, ``Melamine in Milk Products in
China: Examining the Factors That Led to Deliberate Use of the
Contaminant,'' Food Policy, 35(5):463-470, 2010.
12. World Health Organization. Food Security Page. https://www.who.int/trade/glossary/story028/en. Accessed September 23, 2013
13. Kolavic, S., A. Kimura, S. Simons, L. Slutsker, S. Barth,
and C. Haley, ``An Outbreak of Shigella dysenteriae Type 2 Among
Laboratory Workers Due to Intentional Food Contamination,'' Journal
of American Medical Association, 278(5):396-398, August 1997.
14. Anderson, S., J. DeMent, C.B. Ocfemia, and D.C. Hunt,
Outbreaks of Methomyl Poisoning Caused by the Intentional
Contamination of Salsa at the Mi Ranchito Restaurant in Lenexa, KS--
August 2009, Kansas Department of Health and Environment, April 12,
2011. https://www.kdheks.gov/epi/download/Final_Mi_Ranchito_Report.pdf. Accessed October 22, 2013.
15. U.S. Government Printing Office. Senate Hearing 108-491,
``Agroterrorism: The Threat to America's Breadbasket,'' p. 1,
November 19, 2003. https://www.gpo.gov/fdsys/pkg/CHRG-108shrg91045/html/CHRG-108shrg91045.htm. Accessed September 23, 2013.
16. The White House, Office of the Press Secretary. Homeland
Security Presidential Directive/HSPD-8, December, 17, 2003. https://www.fas.org/irp/offdocs/nspd/hspd-8.html. Accessed October 17, 2013.
17. The White House, Office of the Press Secretary. Homeland
Security Presidential Directive 7: Critical Infrastructure
Identification, Prioritization, and Protection, December, 17, 2003.
https://www.dhs.gov/homeland-security-presidential-directive-7.
Accessed October 17, 2013.
18. The White House, Office of the Press Secretary. Homeland
Security Presidential Directive/HSPD-9, January, 30, 2004. https://www.fas.org/irp/offdocs/nspd/hspd-9.html. Accessed October 17, 2013.
19. The White House, Office of the Press Secretary. Presidential
Policy Directive/PPD-8: National Preparedness, March 30, 2011.
https://www.dhs.gov/presidential-policy-directive-8-national-preparedness. Accessed October 17, 2013.
20. The White House, Office of the Press Secretary. Presidential
Policy Directive 21:
[[Page 78057]]
Critical Infrastructure Security and Resilience, February 12, 2013.
https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
Accessed October 7, 2013.
21. U.S. Food and Drug Administration. Strategic Partnership
Program Agroterrorism (SPPA) Initiative: Final Summary Report
September 2005--September 2008, December 2008. https://www.fda.gov/Food/FoodDefense/FoodDefensePrograms/ucm170509.htm. Accessed
September 23, 2013.
22. U.S. Food and Drug Administration, Center for Food Safety
and Applied Nutrition. ``Guidance for Industry: Food Producers,
Processors, and Transporters: Food Security Preventive Measures
Guidance,'' March 2003, Revision October 2007. https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/FoodDefense/ucm083075.htm. Accessed September 23, 2013.
23. U.S. Food and Drug Administration, Center for Food Safety
and Applied Nutrition. ``Guidance for Industry: Importers and
Filers: Food Security Preventive Measures Guidance,'' March 2003,
Revision October 2007. https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/FoodDefense/ucm078978.htm.
Accessed September 23, 2013.
24. U.S. Food and Drug Administration, Center for Food Safety
and Applied Nutrition. ``Guidance for Industry: Dairy Farms, Bulk
Milk Transporters, Bulk Milk Transfer Stations and Fluid Milk
Processors: Food Security Preventive Measures Guidance,'' July 2003,
Revision October 2007. https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/FoodDefense/ucm078978.htm.
Accessed September 23, 2013.
25. U.S. Food and Drug Administration, Center for Food Safety
and Applied Nutrition. ``Guidance for Industry: Retail Food Stores
and Food Service Establishments: Food Security Preventive Measures
Guidance,'' December 2003, Revision October 2007. https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/FoodDefense/ucm082751.htm.
Accessed September 23, 2013.
26. U.S. Food and Drug Administration, Center for Food Safety
and Applied Nutrition. ``Guidance for Industry: Cosmetics Processors
and Transporters of Cosmetics Security Preventive Measures
Guidance,'' November 2003, Revision October 2007. https://www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/FoodDefense/ucm082716.htm.
Accessed September 23, 2013.
27. U.S. Food and Drug Administration. Food Defense 101 Page.
https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm353774.htm. Accessed October 17, 2013.
28. U.S. Food and Drug Administration. Employees FIRST Page.
https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm295997.htm. Accessed and printed on October 17, 2013.
29. U.S. Food and Drug Administration. Vulnerability Assessment
Software Page, Version 2.4, November 2011. https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm295900.htm. Accessed
September 25, 2013.
30. U.S. Food and Drug Administration. Mitigation Strategies
Database Page. https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm295898.htm. Accessed September 25,
2013.
31. U.S. Food and Drug Administration. Food Defense Plan Builder
Software Page. https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm349888.htm. Accessed September 25,
2013.
32. U.S. Food and Drug Administration. Food Related Emergency
Exercise Bundle (FREE-B) Page. https://www.fda.gov/Food/FoodDefense/ToolsEducationalMaterials/ucm295902.htm. Accessed October 17, 2013.
33. Global Food Safety Initiative. GFSI Guidance Document,
Version 6.1, 6(2), August 2011. https://www.mygfsi.com/gfsifiles/Guidance_Document_Sixth_Edition_Version_6.1.pdf. Accessed
September 23, 2013.
34. Safe Quality Food Institute. SQF Code: A HACCP-Based
Supplier Assurance Code for the Food Industry, Edition 7.1, April
2013. https://www.sqfi.com/wp-content/uploads/SQF-Code-Ed-7.1-4-3-13.pdf. Accessed October 17, 2013.
35. International Featured Standards. Events and Academy Page.
https://www.ifs-certification.us/events. Accessed November 5, 2013.
36. China Inspection and Quarantine Service, Administrative
Provisions on Filing of Export Food Production Enterprises Page.
https://en.ciqcid.com/Zjl/Comprehensives/51829.htm. Accessed
September 25, 2013.
37. German Federal Office of Consumer Protection and Food
Safety. ``General Recommendations for Protection of Animal Feed and
Food Supply Chain From the Intentional Release of Agents,'' February
2011. Accessed October 22, 2013.
38. French Republic. Guide Containing Recommendations for the
Protection of the Food Chain From Threats of Malevolent, Criminal,
or Terrorist Acts, May 2007. https://www.frenchfoodintheus.org/IMG/pdf/I07008308-imtnea-Guide_des_recommandations-ENG_3_.pdf.
Accessed and printed on September 23, 2013.
39. Trusted Information Sharing Network for Critical
Infrastructure Protection. A National Strategy for Enhancing the
Safety and Security of our Food Supply, March 2006. https://www.daff.gov.au/__data/assets/pdf_file/0004/183325/enhancing_safety_security_strategy.pdf. Accessed September 23, 2013.
40. U.S. Food and Drug Administration. Memorandum to the File:
Evaluation of the potential for intentional adulteration of produce
during activities that occur on produce farms, September 2013.
41. Buttars, N.K., A.J. Young, D. Bailey, ``Adoption of Security
Systems by Dairy Farms To Address Bioterrorist Threats in the
Intermountain United States,'' Journal of Dairy Science, 89:1822-
1829, 2006. Accessed October 22, 2013.
42. International Dairy Foods Association. Global Markets Page.
https://www.idfa.org/key-issues/category/global-markets/map/#us.
Accessed October 23, 2013.
43. Newkirk, R., C. Hedberg, and J. Bender, ``Establishing a
Milkborne Disease Outbreak Profile: Potential Food Defense
Implications,'' Foodborne Pathogens and Disease, 8(3):433-437, 2011.
44. Popkin, B., ``Patterns of Beverage Use Across the
Lifecycle,'' Physiology and Behavior, 100(1):4-9, 2010.
45. Sebastian, R.S., J.D. Goldman, C.W. Enns, and R.P. LaComb,
``Fluid Milk Consumption in the United States: What We Eat In
America, NHANES 2005-2006,'' Food Surveys Research Group Dietary
Data Brief No. 3, September 2010. https://ars.usda.gov/SP2UserFiles/Place/12355000/pdf/DBrief/3_milk_consumption_0506.pdf. Accessed
October 23, 2013.
46. U.S. Department of Agriculture and Economic Research
Service. Dairy Products: Per capita consumption, United States
(Annual), 2013. https://www.ers.usda.gov/data-products/dairy-data.aspx. Accessed October 23, 2013.
47. Wein, L.M. and Y. Lui, ``Analyzing a Bioterror Attack on the
Food Supply: The Case of Botulinum Toxin in Milk,'' Proceedings of
the National Academy of Sciences of the United States of America,
102(28):9984-9989, 2005.
48. Blayney, D.P., ``The Changing Landscape of U.S. Milk
Production,'' Statistical Bulletin No. 978, U.S. Department of
Agriculture, June 2002. https://usda.mannlib.cornell.edu/usda/nass/sb/sb978.pdf. Accessed October 23, 2013.
49. Codex Alimentarius Commission. General Principles of Food
Hygiene, CAC/RCP 1-1969, 2003.
50. Sobel J. and J. Watson, ``Chapter 10: Intentional Terrorism
Contamination of Food and Water,'' Beyond Anthrax, Springer Link,
2009.
51. Stinson, T.F., J. Kinsey, D. Degeneffe, and K. Ghosh, How
Should America's Anti-Terrorism Budget Be Allocated? Findings From a
National Survey of Attitudes of U.S. Residents About Terrorism, The
Food Industry Center, March 2006. https://ageconsearch.umn.edu/bitstream/14351/1/tr06-01.pdf. Accessed October 21, 2013.
52. Merriam-Webster. Vulnerability Page. https://www.merriam-webster.com/dictionary/vulnerability. Accessed October 21, 2013.
53. U.S. Food and Drug Administration, Study and Report on the
Food Processing Sector, 2011.
54. U.S. Food and Drug Administration. Analysis of Results for
FDA Food Defense Vulnerability Assessments and Identification of
Activity Types, April 2013. https://www.fda.gov/food/guidanceregulation/fsma/ucm347023.htm. Accessed September 25, 2013.
55. U.S. Food and Drug Administration. Memorandum to the File:
Evaluation of the potential for intentional adulteration of animal
feed from acts of terrorism, December 2013.
56. U.S. Department of Health and Human Services, Public Health
Service, and National
[[Page 78058]]
Toxicology Program. Report on Carcinogens, 12th Edition, 2011.
57. U.S. Department of Health and Human Services, Centers for
Disease Control and Prevention, and U.S. Department of Agriculture.
HHS and USDA Select Agents and Toxins 7 CFR Part 331, 9 CFR Part
121, and 42 CFR Part 73, September 10, 2013. https://www.selectagents.gov/resources/List_of_Select_Agents_and_Toxins_2013-09-10.pdf. Accessed October 21, 2013.
58. U.S. Food and Drug Administration. Vulnerability Assessments
of Food Systems: Final Summary Report, June 2009-February 2012.
https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf.
Accessed September 23, 2013.
59. AIB International. Food Safety and Food Defense Education
Page. https://www.aibonline.org/foodsafetyeducation/.
Accessed October 17, 2013.
60. Center for Agriculture and Food Security and Preparedness
and University of Tennessee Knoxville. Instructor-Led Courses Page:
Agriculture and Food Vulnerability Assessment Training. https://www.vet.utk.edu/cafsp/courses.php. Accessed October 17, 2013.
61. International Featured Standards. IFS Food: Standard for
Auditing Quality and Food Safety of Food Products, Version 6,
January 2012. https://www.ifs-certification.com/images/ifs_standards/ifs6/IFS_Food_V6_en.pdf. Accessed September 23, 2013.
62. National Center for Food Protection and Defense. Food
Defense Online Modules Page. https://www.ncfpd.umn.edu/index.cfm/education/food-defense-online-modules/. Accessed October 17, 2013.
63. AIB International. The AIB International Consolidated
Standards for Inspection: Prerequisite and Food Safety Programs,
January 2013. https://www.aibonline.org/Standards/2013FoodSafety_web_ENG.pdf. Accessed October 17, 2013.
64. U.S. Food and Drug Administration. FDA's Preliminary
Regulatory Impact Analysis, Preliminary Regulatory Flexibility
Analysis, Preliminary Unfunded Mandates Reform Act Analysis,
Preliminary Paperwork Reduction Act Analysis, December 2013.
65. U.S. Food and Drug Administration. Memorandum to the File:
Environmental analysis related to the proposed rule on focused
mitigation strategies to protect food against intentional
adulteration, November 2013.
List of Subjects in 21 CFR Part 121
Food packaging, Foods.
Therefore, under the Federal Food, Drug, and Cosmetic Act and under
authority delegated to the Commissioner of Food and Drugs, it is
proposed that 21 CFR chapter I be amended by adding part 121 to read as
follows:
PART 121--FOCUSED MITIGATION STRATEGIES TO PROTECT FOOD AGAINST
INTENTIONAL ADULTERATION
Subpart A--General Provisions
Sec.
121.3 Definitions.
121.5 Exemptions.
Subpart B--[Reserved]
Subpart C--Food Defense Measures
121.126 Requirement for a food defense plan.
121.130 Identification of actionable process steps.
121.135 Focused mitigation strategies for actionable process steps.
121.140 Monitoring.
121.145 Corrective actions.
121.150 Verification.
121.160 Training.
Subpart D--Requirements Applying to Records That Must Be Established
and Maintained
121.301 Records subject to the requirements of this subpart.
121.305 General requirements applying to records.
121.310 Additional requirements applying to the food defense plan.
121.315 Requirements for record retention.
121.320 Requirements for official review.
121.325 Public disclosure.
Subpart E--Compliance
121.401 Compliance.
Authority: 21 U.S.C. 331, 342, 350g, 350(i), 371, 374.
Subpart A--General Provisions
Sec. 121.3 Definitions.
The definitions and interpretations of terms in section 201 of the
Federal Food, Drug, and Cosmetic Act are applicable to such terms when
used in this part. The following definitions also apply:
Actionable process step means a point, step, or procedure in a food
process at which food defense measures can be applied and are essential
to prevent or eliminate a significant vulnerability or reduce such
vulnerability to an acceptable level.
Contaminant means any biological, chemical, physical or
radiological agent that may be intentionally added to food and that may
cause illness, injury or death.
Facility means a domestic facility or a foreign facility that is
required to register under section 415 of the Federal Food, Drug, and
Cosmetic Act (21 U.S.C. 350d), in accordance with the requirements of
21 CFR part 1, subpart H.
Farm means farm as defined in Sec. 1.227 of this chapter.
FDA means the Food and Drug Administration.
Focused mitigation strategies mean those risk-based, reasonably
appropriate measures that a person knowledgeable about food defense
would employ to significantly minimize or prevent significant
vulnerabilities identified at actionable process steps, and that are
consistent with the current scientific understanding of food defense at
the time of the analysis.
Food means food as defined in section 201(f) of the Federal Food,
Drug, and Cosmetic Act (21 U.S.C. 321(f)) and includes raw materials
and ingredients.
Food defense means the effort to protect food from intentional acts
of adulteration where there is an intent to cause public health harm
and economic disruption.
Holding means storage of food. Holding facilities include
warehouses, cold storage facilities, storage silos, grain elevators,
and liquid storage tanks. For farms and farm mixed-type facilities,
holding also includes activities traditionally performed by farms for
the safe or effective storage of raw agricultural commodities grown or
raised on the same farm or another farm under the same ownership, but
does not include activities that transform a raw agricultural
commodity, as defined in section 201(r) of the Federal Food, Drug, and
Cosmetic Act, into a processed food as defined in section 201(gg).
Manufacturing/processing means making food from one or more
ingredients, or synthesizing, preparing, treating, modifying or
manipulating food, including food crops or ingredients. Examples of
manufacturing/processing activities are cutting, peeling, trimming,
washing, waxing, eviscerating, rendering, cooking, baking, freezing,
cooling, pasteurizing, homogenizing, mixing, formulating, bottling,
milling, grinding, extracting juice, distilling, labeling, or
packaging. For farms and farm mixed-type facilities, manufacturing/
processing does not include activities that are part of harvesting,
packing, or holding.
Mixed-type facility means an establishment that engages in both
activities that are exempt from registration under section 415 of the
Federal Food, Drug, and Cosmetic Act and activities that require the
establishment to be registered. An example of such a facility is a
``farm mixed-type facility,'' which is an establishment that grows and
harvests crops or raises animals and may conduct other activities
within the farm definition, but also conducts activities that require
the establishment to be registered.
Monitor means to conduct a planned sequence of observations or
measurements to assess whether focused mitigation strategies are
consistently applied and to produce an accurate record for use in
verification.
[[Page 78059]]
Packing means placing food into a container other than packaging
the food. For farms and farm mixed-type facilities, packing also
includes activities traditionally performed by farms to prepare raw
agricultural commodities grown or raised on the same farm or another
farm under the same ownership for storage and transport, but does not
include activities that transform a raw agricultural commodity, as
defined in section 201(r) of the Federal Food, Drug, and Cosmetic Act,
into a processed food as defined in section 201(gg).
Qualified end-user, with respect to a food, means the consumer of
the food (where the term consumer does not include a business); or a
restaurant or retail food establishment (as those terms are defined in
Sec. 1.227 of this chapter) that:
(1) Is located:
(i) In the same State as the qualified facility that sold the food
to such restaurant or establishment; or
(ii) Not more than 275 miles from such facility; and
(2) Is purchasing the food for sale directly to consumers at such
restaurant or retail food establishment.
Qualified facility means (when including the sales by any
subsidiary; affiliate; or subsidiaries or affiliates, collectively, of
any entity of which the facility is a subsidiary or affiliate) a
facility that is:
(1) A very small business as defined in this part; or
(2) A facility to which both of the following apply:
(i) During the 3-year period preceding the applicable calendar
year, the average annual monetary value of the food manufactured,
processed, packed or held at such facility that is sold directly to
qualified end-users (as defined in this part) during such period
exceeded the average annual monetary value of the food sold by such
facility to all other purchasers; and
(ii) The average annual monetary value of all food sold during the
3-year period preceding the applicable calendar year was less than
$500,000, adjusted for inflation.
Significant vulnerability means a vulnerability for which a prudent
person knowledgeable about food defense would employ food defense
measures because of the potential for serious adverse health
consequences or death and the degree of accessibility to that point in
the food process.
Significantly minimize means to reduce to an acceptable level,
including to eliminate.
Small business means a business employing fewer than 500 persons.
Verification means those activities, other than monitoring, that
establish that the system is operating according to the food defense
plan.
Very small business means a business that has less than $10,000,000
in total annual sales of food, adjusted for inflation.
Vulnerability means the susceptibility of a point, step, or
procedure in a facility's food process to intentional adulteration.
Sec. 121.5 Exemptions.
(a) This part does not apply to a qualified facility, except that
qualified facilities must, upon request, provide for official review
documentation that was relied upon to demonstrate that the facility
meets this exemption. Such documentation must be retained for 2 years.
(b) This part does not apply to the holding of food, except the
holding of food in liquid storage tanks.
(c) This part does not apply to the packing, re-packing, labeling,
or re-labeling of food where the container that directly contacts the
food remains intact.
(d) This part does not apply to activities of a facility that are
subject to section 419 of the Federal Food, Drug, and Cosmetic Act (21
U.S.C. 350h) (Standards for Produce Safety).
(e)(1) This part does not apply with respect to alcoholic beverages
at a facility that meets the following two conditions:
(i) Under the Federal Alcohol Administration Act (27 U.S.C. 201 et
seq.) or chapter 51 of subtitle E of the Internal Revenue Code of 1986
(26 U.S.C. 5001 et seq.) the facility is required to obtain a permit
from, register with, or obtain approval of a notice or application from
the Secretary of the Treasury as a condition of doing business in the
United States, or is a foreign facility of a type that would require
such a permit, registration, or approval if it were a domestic
facility; and
(ii) Under section 415 of the Federal Food, Drug, and Cosmetic Act
(21 U.S.C. 350d) the facility is required to register as a facility
because it is engaged in manufacturing, processing, packing, or holding
one or more alcoholic beverages.
(2) This part does not apply with respect to food other than
alcoholic beverages at a facility described in paragraph (e)(1) of this
section, provided such food:
(i) Is in prepackaged form that prevents any direct human contact
with such food; and
(ii) Constitutes not more than 5 percent of the overall sales of
the facility, as determined by the Secretary of the Treasury.
(f) This part does not apply to the manufacturing, processing,
packing, or holding of food for animals other than man.
Subpart B--[Reserved]
Subpart C--Food Defense Measures
Sec. 121.126 Requirement for a food defense plan.
(a) Food defense plan. The owner, operator, or agent in charge of a
facility must prepare, or have prepared, and implement a written food
defense plan.
(b) Contents of a food defense plan. The food defense plan must
include:
(1) The written identification of actionable process steps as
required by Sec. 121.130;
(2) The written focused mitigation strategies as required by Sec.
121.135(b);
(3) The written procedures for monitoring as required by Sec.
121.140(a);
(4) The written corrective action procedures as required by Sec.
121.145(a)(1); and
(5) The written verification procedures as required by Sec.
121.150(e).
Sec. 121.130 Identification of actionable process steps.
The owner, operator, or agent in charge of a facility must identify
any actionable process steps, using the procedures described in either
paragraph (a) or paragraph (b) of this section. The identification of
actionable process steps and the assessment leading to that
identification must be written.
(a) Key activity types. The owner, operator, or agent in charge of
a facility must assess, for each type of food manufactured, processed,
packed or held at the facility, whether the facility has one or more of
the following key activity types and identify the actionable process
steps associated with any key activity types present:
(1) Bulk liquid receiving and loading--a step in which a bulk
liquid is received and unloaded from an inbound conveyance or loaded
into an outbound conveyance where a contaminant can be intentionally
introduced and, if it is, it is likely that the contaminant will be
distributed throughout the liquid due to sloshing, movement, or
turbulence caused by the receiving and unloading or loading activity.
(2) Liquid storage and handling--a step in which a liquid is
contained in bulk storage tanks or in holding, surge,
[[Page 78060]]
or metering tanks where a contaminant can be intentionally introduced
and, if it is, it is likely that the contaminant will be distributed
into the food.
(3) Secondary ingredient handling--a staging, preparation,
addition, or rework step where a contaminant can be intentionally
introduced into a relatively small amount of ingredient or rework and,
if it is, it is likely that the contaminant will be distributed into a
larger volume of food.
(4) Mixing and similar activities--a step, such as mixing,
blending, homogenizing, or grinding where a contaminant can be
intentionally introduced and, if it is, it is likely that the
contaminant will be distributed into the food.
(b) Vulnerability assessment. The owner, operator, or agent in
charge of a facility must conduct or have conducted, for each type of
food manufactured, processed, packed or held at the facility, an
evaluation to identify and prioritize the points, steps, and procedures
in a food operation based on their vulnerability to intentional
adulteration and to identify actionable process steps. Such
vulnerability assessments must be performed by an individual(s)
qualified by experience and/or training using appropriate methods.
Sec. 121.135 Focused mitigation strategies for actionable process
steps.
(a) The owner, operator, or agent in charge of a facility must
identify and implement focused mitigation strategies at each actionable
process step to provide assurances that the significant vulnerability
at each step will be significantly minimized or prevented and the food
manufactured, processed, packed, or held by such facility will not be
adulterated under section 402 of the Federal Food, Drug, and Cosmetic
Act (21 U.S.C. 342).
(b) Focused mitigation strategies must be written.
(c) Focused mitigation strategies required under this section are
subject to:
(1) Monitoring as required by Sec. 121.140;
(2) Corrective actions as required by Sec. 121.145; and
(3) Verification as required by Sec. 121.150.
Sec. 121.140 Monitoring.
(a) The owner, operator, or agent in charge of a facility must
establish and implement written procedures, including the frequency
with which they are to be performed, for monitoring the focused
mitigation strategies.
(b) The owner, operator, or agent in charge of a facility must
monitor the focused mitigation strategies with sufficient frequency to
provide assurances that they are consistently applied.
(c) All monitoring of focused mitigation strategies in accordance
with this section must be documented in records that are subject to
verification in accordance with Sec. 121.150(a) and records review in
accordance with Sec. 121.150(c).
Sec. 121.145 Corrective actions.
(a) Corrective action procedures. (1) The owner, operator, or agent
in charge of a facility must establish and implement written corrective
action procedures that must be taken if focused mitigation strategies
are not properly implemented.
(2) The corrective action procedures must describe the steps to be
taken to ensure that appropriate action is taken to identify and
correct a problem with implementation of a focused mitigation strategy
to reduce the likelihood that the problem will recur.
(b) Documentation. All corrective actions taken in accordance with
this section must be documented in records that are subject to
verification in accordance with Sec. 121.150(b) and records review in
accordance with Sec. 121.150(c).
Sec. 121.150 Verification.
(a) Monitoring. The owner, operator, or agent in charge of a
facility must verify that monitoring is being conducted, as required by
Sec. 121.140.
(b) Corrective actions. The owner, operator, or agent in charge of
a facility must verify that appropriate decisions about corrective
actions are being made, as required by Sec. 121.145.
(c) Implementation and effectiveness. The owner, operator, or agent
in charge of a facility must verify that the focused mitigation
strategies are consistently implemented and are effectively and
significantly minimizing or preventing the significant vulnerabilities.
As appropriate to the facility and the food, this must include review
of the monitoring and corrective actions records within appropriate
timeframes to ensure that the records are complete, the activities
reflected in the records occurred in accordance with the food defense
plan, the focused mitigation strategies are effective, and appropriate
decisions were made about corrective actions.
(d) Reanalysis. The owner, operator, or agent in charge of a
facility must:
(1) Conduct a reanalysis of the food defense plan:
(i) At least once every 3 years;
(ii) Whenever a significant change is made in the activities
conducted at a facility operated by such owner, operator, or agent in
charge if the change creates a reasonable potential for a new
vulnerability or a significant increase in a previously identified
vulnerability;
(iii) Whenever such owner, operator or agent in charge becomes
aware of new information about potential vulnerabilities associated
with the food operation or facility;
(iv) Whenever a focused mitigation strategy is found to be
ineffective; and
(v) Whenever FDA requires reanalysis to respond to new
vulnerabilities and developments in scientific understanding including,
as appropriate, results from the Department of Homeland Security
biological, chemical, radiological, or other terrorism risk assessment.
(2) Complete such reanalysis and implement any additional focused
mitigation strategies needed to address the significant vulnerabilities
identified, if any, before the change in activities at the facility is
operative or, when necessary, during the first 6 weeks of production;
and
(3) Revise the written plan if a significant change is made or
document the basis for the conclusion that no additional or revised
focused mitigation strategies are needed.
(e) Documentation. All verification activities taken in accordance
with this section must be documented in records.
Sec. 121.160 Training.
(a) Personnel and supervisors assigned to actionable process steps
must receive appropriate training in food defense awareness and their
respective responsibilities in implementing focused mitigation
strategies.
(b) All training received in accordance with this section must be
documented in records.
Subpart D--Requirements Applying to Records That Must Be
Established and Maintained
Sec. 121.301 Records subject to the requirements of this subpart D.
(a) Except as provided by paragraph (b) of this section, all
records required by subpart C of this part are subject to all
requirements of this subpart D.
(b) The requirements of Sec. 121.310 apply only to the written
food defense plan.
Sec. 121.305 General requirements applying to records.
Records must:
(a) Be kept as original records, true copies (such as photocopies,
pictures, scanned copies, microfilm, microfiche,
[[Page 78061]]
or other accurate reproductions of the original records), or electronic
records, which must be kept in accordance with part 11 of this chapter;
(b) Contain the actual values and observations obtained during
monitoring;
(c) Be accurate, indelible, and legible;
(d) Be created concurrently with performance of the activity
documented;
(e) Be as detailed as necessary to provide history of work
performed; and
(f) Include:
(1) The name and location of the facility;
(2) The date and time of the activity documented;
(3) The signature or initials of the person performing the
activity; and
(4) Where appropriate, the identity of the product and the
production code, if any.
Sec. 121.310 Additional requirements applying to the food defense
plan.
The food defense plan must be signed and dated by the owner,
operator, or agent in charge of the facility:
(a) Upon initial completion; and
(b) Upon any modification.
Sec. 121.315 Requirements for record retention.
(a) All records required by this part must be retained at the
facility for at least 2 years after the date they were prepared.
(b) The food defense plan must be retained for at least 2 years
after its use is discontinued;
(c) Except for the food defense plan, offsite storage of records is
permitted after 6 months following the date that the record was made if
such records can be retrieved and provided onsite within 24 hours of
request for official review. The food defense plan must remain onsite.
Electronic records are considered to be onsite if they are accessible
from an onsite location.
(d) If the facility is closed for a prolonged period, the records
may be transferred to some other reasonably accessible location but
must be returned to the facility within 24 hours for official review
upon request.
Sec. 121.320 Requirements for official review.
All records required by this part must be made promptly available
to a duly authorized representative of the Secretary of Health and
Human Services upon oral or written request.
Sec. 121.325 Public disclosure.
Records required by this part will be protected from public
disclosure to the extent allowable under part 20 of this chapter.
Subpart E--Compliance
Sec. 121.401 Compliance.
(a) The operation of a facility that manufactures, processes,
packs, or holds food for sale in the United States if the owner,
operator, or agent in charge of such facility is required to comply
with, and is not in compliance with, section 418 of the Federal Food,
Drug, and Cosmetic Act (21 U.S.C. 350g) or subparts C or D of this part
is a prohibited act under section 301(uu) of the Federal Food, Drug,
and Cosmetic Act (21 U.S.C. 331(uu)).
(b) The failure to comply with section 420 of the Federal Food,
Drug, and Cosmetic Act (21 U.S.C. 350i) or subparts C or D of this part
is a prohibited act under section 301(ww) of the Federal Food, Drug,
and Cosmetic Act.
Dated: December 13, 2013.
Leslie Kux,
Assistant Commissioner for Policy.
[FR Doc. 2013-30373 Filed 12-20-13; 8:45 am]
BILLING CODE 4160-01-P