Skip to main content

What is food Fraud?

Food fraud originated as a way to extend a food’s primary ingredients for added profit. As our food supply becomes more globalized, fraudsters are using the importation process to take advantage of food companies wherever they can. According to the FDA, the number of adulterated food products they are seeing has tripled over the past 10 years. And, as supply chains become increasingly complex and fragmented, it is becoming harder to detect cases of adulteration. What’s more, some food companies seeking new ways to keep pricing down are outsourcing to suppliers who are tempted to substitute, sometimes at the cost of the safety and the integrity of the company’s brand.
From olive oil, to honey and even horsemeat, consumers are unwittingly purchasing and consuming food that may have been adulterated or tampered with, and this can seriously compromise their health. As consumers become aware of these incidents through main stream and social media, they start to turn away from brands they once trusted, which can impact your food brand: food fraud can not only harm your consumers, it can also threaten your profits!
Awais Akram
Business Development Manager

PMS Certification
No. 16, 30-B/1, First Floor, Chandni Center Plaza, Chandni Chowk, Rawalpindi - Pakistan
 + 92 51 4906975-6, + 92 334 5762683 bdm@pmscertificaiton.com

Comments

Popular posts from this blog

ISO 27001 – Information Security Management System (ISMS)

ISO 27001 – Information Security Management System (ISMS) ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS). An ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's information risk management processes. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." ISO 27001 uses a topdown, risk-based approach and is technology-neutral. The specification defines a six-part planning process: ·          Define a security policy. ·          Define the scope of the ISMS. ·          Conduct a risk assessment. ·         ...

PMS certification

  PMS Certification is currently undertaking a comprehensive GAP Analysis and conducting interviews with the Quality , Health , Safety , and Environment (QHSE) team at Saif Textile Mill http://www.pmscertification.com Limited as part of the process for obtaining ISO 9001 and ISO 14001 certifications . This initiative aims to assess the existing quality management and environmental management systems in place at the mill, identifying any discrepancies or areas for improvement that may hinder compliance with the international standards . The GAP Analysis will involve a thorough review of current practices , documentation , and operational procedures , while the interviews will provide valuable insights from team members regarding their understanding and implementation of QHSE protocols . By engaging in this detailed evaluation, PMS Certification seeks to ensure that Saif Textile Mill Limited not only meets the necessary requirements for certification but also en...

ISO 9001:2015 with PDCA Model

An ISO 9001:2015 QMS is a balanced system and to keep your ISO system working effectively you need to value each PDCA element equally and not favor one (i.e. Plan, Do) over the other (Check, Act).