Using Advanced Security Technology to Comply with the Food Safety Modernization Act

Food Safety Modernization Act places focus on prevention

Last year, the Food Safety Modernization Act (FSMA), was implemented to prevent food-borne disease caused by both intentional and unintentional sources, and to improve detection and response when an outbreak occurs. Signed by President Barack Obama, and implemented by the Food and Drug Administration (FDA), FSMA strengthened requirements for companies that manufacture, supply, process, pack or hold food products – in an effort to increase food safety throughout the United States. Notably, the legislation grants the FDA mandatory recall authority of food products and the authority to suspend the registration of food facilities to prevent the import and export into the United States of food from a facility that has a reasonable probability of causing harm to humans or animals. In the first year since enactment, the FDA has also exercised its new authority to administratively detain food products that it has reason to believe are adulterated or misbranded, for up to 30 days, if needed.

As LeeAnne Jackson, Health Science Policy Adviser for the FDA stated at ADT’s Second Annual Food Defense Strategy Exchange, “The historic FSMA is aimed at transforming our food safety efforts toward prevention and based on risk analysis”. It would behoove food manufacturers and distributors to also focus on preventive versus reactive strategies to protect their brand and prevent contaminated food from reaching the public.

So what should food companies do to move towards a more preventive food defense posture to protect against intentional food adulteration? The FDA’s approach to preventive controls is depicted in the following graphic.

Companies can approach their food defense strategies in a similar manner by asking some important questions to assess their vulnerabilities to intentional food adulteration, such as:

  • Do we know where the critical control points are in all of our facilities that could be potential areas of vulnerability for food adulteration?
  • What access control measures do we currently have in place for authorized personnel vs. non-authorized employees, contractors, suppliers and visitors?
  • Does our organization have the capability to provide continuous monitoring of goods throughout our extended supply chain to prevent intentional incidents of food adulteration?
  • Does our company have reliable audit processes in place that can ensure consistent compliance to corporate operational and regulatory standards for the implementation of best food defense practices?

One specific area where a proactive food defense posture can be taken is on how access to critical control points inside of facilities is managed. The critical control areas identified by the FDA include, but are not limited to, processing, shipping and receiving, laboratories, raw materials, chemical storage and hazardous storage facilities. Given the sensitivity of these areas, personnel access and movement through the critical control points, such as areas where large batches of food are being mixed, should be restricted to authorized personnel only.

Advanced Security Technologies that focus on prevention

Traditional security technologies, such as proximity access control systems and CCTV systems, have been widely deployed and are effective in securing entry into a facility and monitoring activities so authorities can react to incidents as they occur. But how can a company utilize advanced security technologies to implement preventive controls that may protect them before potentially hazardous events could occur?

Food companies should focus on solutions that can help secure specific critical areas, even if they are in wide open plant floor layouts, and deliver intelligent, real time awareness in order to build a proactive food defense program. This includes Active RFID technologies in which automated actionable intelligence is implemented using smart, networked devices for enhanced situational awareness across the enterprise. These systems can dramatically help reduce brand reputational risk from intentional and unintentional food adulteration.

Technologies that are utilized in real-time location systems (RTLS) to track people and equipment that are optimized for indoor and campus environments are also best suited for food manufacturing facilities. A Wi-Fi based solution is an RTLS that has the advantage of leveraging the existing Wi-Fi network that is commonly installed in facilities for remote computer access. It uses the Wi-Fi standard access points as reference points to identify the location of the tag based on signal strength. A site survey must be conducted to map out the virtual security zones that need to be monitored, and depending on the location precision that is desired, additional access points may need to be installed. Personnel and equipment tags programmed with specific authorities to enter virtual security zones can then be issued, for example, only employees responsible for the mixing area are issued tags for that area. All other employees, visitors and equipment without that authorization would trigger an alert if passing through that area, thus, securing the area against contamination from people and equipment traffic.

Another effective technology is control point location solutions, which utilize active RFID tags that are awakened when passing through specific zones or control points. Activation zones are defined at installation with flexible wire loop antennas that generate a magnetic field that wakes up the tags, and can be adjusted dynamically to fit the physical environment. As personnel and issued equipment tags pass through the activation field, the activator’s location ID is written to the tag. The tag then transmits its ID number and the location ID, thus providing specific location information at time of activation as well as the direction of their movement, whether entering or exiting.

Integrating networked digital video with both passive and active RFID access control technologies can trigger event-based video recording that is searchable by location, time or date and can be instantly retrieved and viewed from any networked monitor. For example, the arrival and unloading of goods in the shipping and receiving areas can trigger video recording of the condition of the container seals and the trailers, the timeliness of the movement of cold chain products to storage, and association with the IDs of the staff handling the shipments. Queries on the status of a particular item can provide a snapshot, a video clip, or live video feeds to assist in providing video verification of specific events.

Physical Security Information Management (PSIM) solutions can trigger specific security responses automatically in response to specific breaches, whereas today these procedures are typically stored off-line and expected to be followed consistently by personnel in all the facilities. PSIM systems also help to centralize all security data throughout all of a food manufacturer’s facilities, so that managers can easily find and provide an audit trail to FDA inspectors, to demonstrate FSMA compliance.

Strong access control protection and implementation of networked security systems and processes create an efficient system that provides transparency, precise traceability and personnel authorization, which are key elements for FSMA compliance. Ultimately, manufacturers should choose the technology that best fits their unique physical plant layout and the specific critical control points that need to be monitored and secured. By deploying real-time location systems, food manufacturers can be proactive in implementing preventive controls consistent with the FSMA mandates.

Don Hsieh is the director of commercial and industrial marketing with ADT Security Services.

Featured

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3