top of page

⌂ / Intentional Adulteration / Food Defense Qualified Individual / IA Conducting Vulnerability Assessments Course

Who should take the course?

​

  • Food professionals who conduct vulnerability assessments (VAs) using the 3 Fundamental Elements

 

​

Delivery Methods

​

  • Instructor-Led: Delivered live, in-person, and/or virtually by IAVA Lead Instructors trained by FSPCA.

FSPCA IA Conducting Vulnerability Assessments Participant Course

 

Instructor-Led

FEES VARY*

*Course fees are set by the individual provider.

FSPCA IA Conducting Vulnerability Assessments Participant Course

This course will provide participants with the knowledge to implement the requirements of conducting a vulnerability assessment under the Mitigation Strategies to Protect Food Against Intentional Adulteration (IA) regulation of the U.S. Food and Drug Administration (FDA). This regulation is one of a number of regulations and guidance that implement the provisions of the 2011 Food Safety Modernization Act (FSMA).

​

The Mitigation Strategies to Protect Food Against Intentional Adulteration regulation (referred to as the IA rule) is aimed at preventing intentional adulteration from acts intended to cause wide-scale public health harm, including acts of terrorism targeting the food supply. The regulation requires that certain activities must be completed by a “food defense qualified individual” who has successfully completed training in the conduct of a vulnerability assessment (21 cfr 121.4). This course developed by the FSPCA is the “standardized curriculum” recognized by FDA; successfully completing this course is one way to meet the requirements for a “food defense qualified individual” responsible for conducting a vulnerability assessment.

​

The IA rule does not specify a particular method that you must use to conduct your vulnerability assessment. Two potential methods that can be used are the Key Activity Type (KAT) and/or the Three Fundamental Elements methods. If you  conduct your vulnerability assessment using the KAT method with no modifications, you should consider completing the FSPCA IA Conducting Vulnerability Assessments Using Key Activity Types course and may not need the training provided in this course. However, if you use any modifications to the KAT method or plan to use the Three Fundamental Elements method, then this course would provide valuable insights.

bottom of page