Implementation in north america

Need Help Developing Your Food Defense Plan?

  • Man A line styled icon from Orion Icon Library.

    Meet GFSI Schemes

    A food defense threat assessment procedure shall be established, implemented, and maintained to identify potential threats and prioritize food defense measures. FSM 7.1. Food defense and food fraud prevention are mandatory parts of GFSI-recognized food safety certification programs.

  • Bank Cards A line styled icon from Orion Icon Library.

    Comply with FDA Requirements

    Intentional adulteration, while unlikely, poses a serious threat to public health and the economic stability of the food industry. The FSMA IA Rule is designed to mitigate these risks by requiring facilities to develop and maintain a food defense plan that identifies and addresses potential vulnerabilities.

FSPCA IAVA

Intentional Adulteration Conducting Vulnerability Assessments Training

The FSMA Intentional Adulteration Rule is unique in its focus on preventing acts intended to cause wide-scale harm, including terrorism. This rule mandates that food facilities develop a written food defense plan.
  • Customized

    We understand that every facility is different, and we tailor our services to meet your specific needs.

  • Proactive

    We provide ongoing support to help you maintain compliance and adapt to any changes in regulations or your operations.

Who Must Comply with the FSMA IA Rule?

Businesses

Larger facilities must comply within three years.

Very Small Businesses

Averaging less than $10 million per year in sales of human food, these businesses have five years from the final rule's publication to comply with modified requirements.

Small Businesses

Employing fewer than 500 persons, these businesses must comply within four years.

U.S. & Canada

Book a Consultation

At FIC, we specialize in guiding facilities through the standard process of developing robust food defense plans that meet FDA requirements and GFSI Schemes. Whether you need assistance with conducting vulnerability assessments, implementing mitigation strategies, or ensuring proper monitoring and verification, our team of experts are here to help.
Name E-mail Company Message
Choose a Service
Initial Consultation - Full Project (30 Minutes Free)
1 Hour (+ 150.00 USD)
Training Inquiry
I agree to the Terms & Conditions and Privacy Policy Submit