The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Form a threat and vulnerability team
|
|
Select a cross-functional team with personnel from across the organisation Completed |
Evidence:
|
Define roles of team members based on knowledge of the implications of food fraud and food vulnerabilities Completed |
Evidence:
|
Schedule regular team meetings to update and review Threat Assessment and Critical Control Points (TACCP) and Vulnerability Assessment and Critical Control Points (VACCP) plans Completed |
Evidence:
|
Develop a food defence plan
|
|
Undertake and document a threat assessment Completed |
Evidence:
|
Develop a flow chart of the supply chain and identify steps where there is potential threat to the organisation, key staff, operations and the product Completed |
Evidence:
|
Undertake a risk assessment to identify the critical control points (CCPs) Completed |
Evidence:
|
Identify where the controls are for each CCP and develop action plans to address breaches Completed |
Evidence:
|
Develop a food defence plan outlining the methods, responsibilities and criteria for preventing food adulteration Completed |
Evidence:
|
Document the plan and schedule a review at least annually Completed |
Evidence:
|
Develop a food fraud mitigation plan
|
|
Undertake and document a vulnerability assessment Completed |
Evidence:
|
Assess raw materials, direct food contact packaging and supply chains to identify where the site is vulnerable to food fraud Completed |
Evidence:
|
Undertake a risk assessment to identify the critical control points (CCPs) Completed |
Evidence:
|
Implement a food fraud mitigation plan to specify the methods of controlling food fraud vulnerabilities Completed |
Evidence:
|
Document the plan and schedule a review at least annually Completed |
Evidence:
|
Maintain records
|
|
Maintain records of the food defence plan securely and ensure they are readily accessible Completed |
Evidence:
|
Maintain records of the review of the food fraud vulnerability assessment and mitigation plan and ensure they are readily accessible Completed |
Evidence:
|