Product Control – Product Authenticity & Integrity

Aligned with BRCGS Food Safety Issue 9 – Clause 5.4

Requirement Overview

BRCGS Clause 5.4 requires certified sites to implement a documented strategy to mitigate food fraud risks and ensure product authenticity and integrity throughout the supply chain. This includes protecting against substitution, dilution, counterfeiting, mislabeling, and misrepresentation of raw materials and finished goods.

Clause 5.4.1: “The site shall have a documented food fraud vulnerability assessment procedure to identify and assess potential risks.”

Clause 5.4.2: “Where risks are identified, a documented mitigation plan shall be developed and implemented.”

Ensuring product authenticity builds consumer trust, protects brand reputation, and prevents regulatory and certification non-conformance.

Aligned with BRCGS for Storage & Distribution Issue 4 – Clause 4.3.1 & 4.3.3

Requirement Overview

BRCGS for Storage & Distribution requires that products moved via cross-docking are traceable and controlled at all times, even when they are not held in storage for extended periods.

Clause 4.3.1: “The company shall ensure that traceability is maintained at all stages, including during cross-docking operations.”
Clause 4.3.3: “Procedures shall be in place to ensure that all products handled, including those not stored on-site, remain under control and are not subject to contamination or substitution.”

Cross-docking operations must not compromise product traceability, safety, or integrity. Even with minimal handling and temporary presence, each product must be accurately identified, documented, and protected.

Key Compliance Objectives

  • Identify and assess food fraud risks across materials and suppliers

    Implement control measures to mitigate authenticity risks

    Maintain up-to-date vulnerability assessments and mitigation plans

    Ensure traceability and verification of high-risk raw materials

Step-by-Step Compliance Implementation

1. Conduct a Food Fraud Vulnerability Assessment

  • Assessment Criteria:

    • Economic incentives for fraud

      History of known incidents

      Supply chain transparency

      Level of ingredient processing

    Evidence to Maintain:

    • Completed vulnerability assessment template

      Justification for scoring (e.g., low/medium/high risk)

      Date of last review and responsible personnel

2. Develop a Product Integrity Mitigation Plan

  • Plan Must Include:

    • Control measures for high-risk ingredients (e.g., COAs, testing, supplier audits)

      Supplier assurance programs and specifications

      Ongoing monitoring and verification methods

    Evidence to Maintain:

    • Documented mitigation plan with review date

      Product-specific testing protocols (e.g., DNA testing, isotopic analysis)

      Supplier verification records

3. Verify Supplier and Material Authenticity

  • Verification Activities:

    • Raw material ID checks upon receipt

      Cross-checks against approved supplier list

      Certificates of Analysis (COA) and authenticity testing

    Evidence to Maintain:

    • Goods-in inspection records

      Supplier COAs and authenticity documentation

      Third-party lab reports, if applicable

4. Review and Update Plans Regularly

  • Review Frequency:

    • Annually at minimum, or when there is a change in:

      – Supplier

      – Material source

      – Known fraud incidents or regulatory alerts

    Evidence to Maintain:

    • Updated assessments with version history

      Internal review meeting notes

      Corrective actions related to detected authenticity issues

Common Audit Findings & Recommended Fixes

Audit Finding Recommended Action
No food fraud assessment conducted Complete and maintain a documented vulnerability assessment
Incomplete mitigation plan for high-risk items Develop specific control measures per ingredient
Outdated or infrequently reviewed assessments Schedule and log annual reviews with justification
Lack of testing or verification records Implement periodic authenticity testing and document results

Auditor Verification Checklist

During a BRCGS audit, expect the auditor to review:

  • Food fraud vulnerability assessments

    Mitigation plans for medium or high-risk ingredients

    Evidence of supplier verification and authenticity testing

    Records of internal reviews and updates

Implementation Roadmap

Build Your Program

  • Identify raw materials and ingredients vulnerable to fraud

    Create and document a food fraud vulnerability assessment

Mitigate and Monitor

  • Develop mitigation strategies for high-risk items

    Perform supplier checks and incoming material verification

Train and Verify

  • Train QA, purchasing, and receiving teams on fraud controls

    Conduct lab testing or verification as appropriate

Improve Continuously

  • Update vulnerability assessments annually

    Adjust plans based on incidents or market intelligence

Why This Matters?

  • Protects product authenticity and brand reputation

    Prevents fraudulent substitution or mislabeling

    Builds trust with consumers, regulators, and certification bodies

    Strengthens supplier accountability and raw material control

Support Tools Available

Food Safety Systems provides:

  • Food fraud vulnerability assessment templates

    Mitigation plan examples by ingredient risk

    Supplier verification checklists

    Testing protocols and authenticity control SOPs