Free Essay

Managing the Virus Hunters

In:

Submitted By campolar
Words 1592
Pages 7
Case: Managing the Virus Hunters
Introduction:
Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses.
Discussion Questions: 1. Keeping Professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters?
The job of the virus hunters is, round-the-clock, a hectic and chaotic job. With professionals facing new challenges every day, which just keep on getting tougher and tougher, it could be a cause to demotivate the professionals, and demote innovation. Vincent Weafer is in a position, where he has to encourage his team to remain professional, and work with as much innovation as possible; and for this purpose, he will have to utilize his managerial skills.
In a job where all the work rotates around technical elements, it is an essential requirement for Mr. Weafer to be knowledgeable in the technical aspects of the work his team does. He should give priority to the learning and understanding how the world of computer viruses work; how they are made, how they function, and how they are cured and get rid of. Without these technical skills, he will not be able to keep a good watch on the work his team does, and not understand or figure out what quality of the work is being done. This will ultimately become the cause of demotivation among the virus-hunters; when they see the person in charge has no idea of what work his team is doing, and they will start working at a lower quality because they will be able to get away with it. If Vincent Weafer knows everything his team is doing, it will help keep his team at a professional level.
As Mr. Weafer works in a challenging and chaotic environment, it won’t be considered abnormal for his virus-hunters’ team members to feel stressed, depressed or heavily demotivated. To tackle these problems, Mr. Weafer has to be good with human skills. The ability to interact effectively with his team members, both individually and in groups, is essential for a well-communicated and well-coordinated team. Employees feel confortable working with a trust-worthy manager, and that’s what Mr. Weafer needs to be. With the trust of his team members, he should coach and mentor them to be the best.
Technical and human skills are not enough to be an effective manager; Vincent Weafer needs to have good conceptual skills too. His ability to think and conceptualize abstract and complex situations will define how well his team succeeds. He should think creatively, look into abstract information, and develop innovative ideas and models to motivate his team. His ability to understand problems and challenges, and tackle them in the best way possible will surely be rewarded with a team that puts all its effort into their work, and do their jobs with responsibility and dedication.
Figure [ 1 ]: Skills required to be an effective manager
Figure 1: Skills required to be an effective manager
To summarize, Vincent Weafer needs to give equal importance to all his managerial skills; technical, human, and conceptual. With best possible effort from him in these skills, his team will reward him with being motivated and being professional. In an environment of the sort Mr. Weafer works in, teamwork and results are the most important things that matter; and with the proper skills, Mr. Weafer can surely be a very effective and efficient manager. 2. What management roles would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting service, or (c) kept employees focused on the company’s commitments to customers?
When holding weekly security briefing conferences with coworkers around the globe, Mr. Weafer will be transmitting security information to and from coworkers around the globe. This job would best be defined as the managerial role of a ‘Disseminator’, as he is holding informational meetings transmitting security information to members of the team.
When assessing feasibility of adding a new network security consulting service, Mr. Weafer is seeking internal and external information, to better understand the organization and environment. This job would best be defined as the managerial role of a ‘Monitor’, as he is seeking and receiving wide variety to information to take best decisions possible.
When keeping employees focused on the company’s commitment to customers, Mr. Weafer is motivating his employees to perform their responsible tasks of fulfilling all the commitments the company has made to their customers. This job would best be defined as the managerial role of a ‘Leader’, as he is motivating his subordinates to perform their duties.

3. Go to Symantec’s Web site (www.symantec.com) and look up information about the company. What can you tell about its emphasis on customer service and innovation? In what ways does the organization support its employees in servicing customers and in being innovative?
Symantec has a very user-friendly website and gives a lot of emphasis on customer service. Some customers have complained that it is hard to find contact numbers on the Symantec website, but whatever the case may be, Symantec does provide phone support to all of its customers, be it household consumers, enterprises, or partners.
Symantec focuses on thinking up of new ideas which would help make the experience of their customers even better. One good example of this would be Symantec’s approach to solve problems with multilingual customer service, solving the issue, and providing security alert to global customers in not only English, but also in their native language.
As far as innovation is concerned for Symantec’s employees, Symantec utilizes an ‘open innovation strategy’ to implement innovation among its employees. They use the term ‘open innovation’ to include both, innovations inside the company as well as innovations they bring from outside the company, be it through acquisitions, or partnering. According to Symantec’s CTO Mark Bregman, in an interview in 2007, he stated partnering is the way to bring new relationships into the market. Symantec uses this strategy to innovate their already existing ideas and plans, with ideas and concepts from the outside environment. Combining their in-house innovativeness with innovation from the outside helps them to create a better strategy, ultimately increasing user experience, support, and service. 4. What could other managers learn from Vincent Weafer and Symantec’s approach?
One of the most important lessons for other managers which can be taken from Vincent Weafer is that no matter how complex, stressful, or chaotic of an environment you work in, your managerial roles are always equally important. Your employees will always be looking up to you for everything, ranging from technical help, to motivational support and trust. A good manager is one whose subordinates feel comfortable in working for. The manager must be knowledgeable, communicative, and trust worthy to lead a professional team and keep them motivated.
Managers can also learn very important tips and ideas from Symantec’s approach. Their approach to keep a chaotic job working round-the-clock around the globe is a lesson that non-stopping tasks can be tackled and made easier for the workers. Symantec has shown that a firm that hires the best people, no matter how diversified they are, performs well. But, the most important thing that managers can learn from Symantec’s approach, is that innovation is available everywhere. We must not limit it to within ourselves only, but look at the outside environment too!
Summary of the Case:
Symantec corp. is an organization that has to perform their operations in a very dynamic environment, where market is being shifted every hour. Their “Response Lab” can be defined as the most chaotic and problematic department. They have a new requirement every hour and have new viruses emerging all the time. New viruses mean new analyses of each viruses and all the time spent in figuring out the cure for the virus, that virus could be out there infecting other users and customers. These viruses are the most important concern for the teams at Symantec, as the sole purpose of most of these viruses is to steal information from those infected, be it personal or corporate data.
Whenever a huge outbreak occurs, for example, the launch of the Blaster-B worm in August 2003, there is nothing but stressful work round-the-clock, with the frontline analysts working 24x7. And because of their constant 24x7 work, they had to have workers working 24x7, and for this Symantec has different labs around the world, with each working while others sleep, so as to keep the continuous work going.
This brings a lot of problems in the managing of the team. The stressful and chaotic work can easily demotivate the workers, and have them feel fed-up of this routinely stressful job. Even the dynamic unpredictable environment gives the manager the challenge of not being able to predict what may happen next.
What Managers can learn from this Case?
Answered previously in question # 4 (previous page).

Similar Documents

Premium Essay

Managing the Virus Hunters

...CASE APPLICATION: Managing the Virus Hunters Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don't have to imagine. That's the reality of their daily work life. At the company's Response Lab in Santa Monica, California, described as the "dirtiest of all our networks at Syamntec", software analysts collect viruses and other suspicious code and try to rigure out how they work so security updates can be provided to the company's customers. By the door to the lab, there's even a hazardous materials box marked "Danger" where they put all the disks, tapes, and hard drives with the nasty viruses that need to be carefully and completely disposed of. Symantec's situation may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects ther elaities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec's virus-hunting team since 1999. Back then, he said, "There were less than two dozen people, and... nothing really happened. We'd see maybe five new viruses a day, and they would spread in a matter of months, not minutes." Now...

Words: 787 - Pages: 4

Premium Essay

Radical Leadership

...1. Keeping in professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? Answer:    Vincent Weafer’s following techniques encouraged innovation and professionalism among the virus hunters:   * Work was divided into smaller parts and specialization   * The work never stopped, to maintain efficiency  The work never stopped, to maintain efficiency  Example: When Santa Monica’s team finished, Tokyo took over, this handed over to Japanese to Dublin and back to Santa Monica. 2. What management roles would Vincent be playing as he   (a) Had weekly security briefing conference calls with coworkers around the globe.   (b) Assessed the feasibility of adding a new network security consulting service, or   (c) Kept employees focused on the company’s commitments to customers?    Answer:      (a) Based on the study by Henry Mintzberg managers have different but highly inter-related roles. According to this we can analyze that Vincent has approached towards Interpersonal role as he worked as a figurehead, leader, liaison and also informational role as he act as a monitor and a disseminator.   (b) In this context Vincent has proved that he has approached towards that he has approached towards Decisional role as he worked as a role as he worked as a disturbance...

Words: 714 - Pages: 3

Free Essay

Managning Virus

...CASE STUDY #1: MANAGING THE VIRUS HUNTERS I.    Time Context           The period in this case study is from 1999 to 2003. Vincent Weafer has been the leader of Symantec Corporation's virus hunting team since 1999. The Launch of Blaster-B worm took place in 2003.   II.    Viewpoint           This case study is about the computer virus hunters at Symantec Corporation. It focuses on the nature of their job and the managerial challenges faced by Vincent Weafer.   III.    Relevant Facts       A.    Symantec Corporation.              Symantec is a global software company. Its mission is to  provide complete online security to its customers and safety  to the cyber world. Symantec deals with the production of antivirus software, which provides protection against harmful  contents for computers. Symantec is a long-term survivor since 1982.       B.    Vincent Weafer                   Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past 10 years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability  response, real-time alerting, content solutions, research, and analysis.                 Weafer...

Words: 285 - Pages: 2

Premium Essay

Manage

...MANAGEMENT ASSIGNMENT 1 CASE STUDY: MANAGING THE VIRUS HUNTERS CLASS ROLL NO.: 33 Questions of Case Study: 1. Keeping in professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? Answer:  Vincent Weafer’s following techniques encouraged innovation and professionalism among the virus hunters: * Work was divided into smaller parts and specialization * The work never stopped, to maintain efficiency  The work never stopped, to maintain efficiency  Example: When Santa Monica’s team finished, Tokyo took over, this handed over to Japanese to Dublin and back to Santa Monica. 2. What management roles would Vincent be playing as he (a) Had weekly security briefing conference calls with coworkers around the globe. (b) Assessed the feasibility of adding a new network security consulting service, or (c) Kept employees focused on the company’s commitments to customers?  Answer:  (a) Based on the study by Henry Mintzberg managers have different but highly inter-related roles. According to this we can analyze that Vincent has approached towards Interpersonal role as he worked as a figurehead, leader, liaison and also informational role as he act as a monitor and a disseminator. (b) In this context Vincent has proved that he has approached towards that he has...

Words: 295 - Pages: 2

Premium Essay

Management

...were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. “That’s the reality of their daily work life. At the company’s response lab in Santa Monica, California, described as the “dirtiest of all our networks at Symantec. “ Software analysts collect viruses and other suspicious cod and try to figure out how they work so the company can provide security updates to its customers. There’s even a hazardous materials box by the door to the lab, marked DANGER, where they put all the discs, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situations may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec’s virus hunting team since 1999. Back then, he said “there were less than two dozen people, and . . . nothing really happened. We’d see may be five new viruses a day, and they would spread in a matter of months, not minutes. “Now, Symantec’s virus hunter around the words deals with some 20,000 virus samples each month, not all of which are unique, stand-alone viruses....

Words: 1368 - Pages: 6

Premium Essay

Waqas

...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...

Words: 354 - Pages: 2

Free Essay

Gm 520

...Week 2 Homework – GM520. 1. State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you or the business in which you are working? If so, how? Submit a copy of the proposed regulation along with your responses to these five questions. The proposed regulation can be submitted as either a separate Word document (.doc) or Adobe file (.pdf). This means you will submit two attachments to the Week 2 Dropbox: (1) a Word doc with the questions and your answers and (2) a copy of the proposed regulation you used for this assignment. (10 points) The regulation that is of concern to me is one that is controlled by U.S. Fish and wildlife service. “A 1940 reorganization plan (54 Stat. 1232) in the Department of the Interior consolidated the Bureau of Fisheries and the Bureau of Biological Survey into one agency to be known as the Fish and Wildlife Service. The Bureau of Sport Fisheries and Wildlife was created as a part of the U.S. Fish and Wildlife Service in the Department of the Interior on November 6, 1956, by the Fish and Wildlife Act of 1956 (70 Stat. 1119). That act was amended on July 1, 1974, by Public Law 93-271 (88 Stat. 92) to, among other purposes, abolish the position of Commissioner of Fish and Wildlife and designate the Bureau as the U.S. Fish and WildlifeService” (www.fws.gov/help/about_us.html).The U.S. fish and wild life service is the principle federal...

Words: 1683 - Pages: 7

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Premium Essay

Linux Security

...Securing Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperative due to an estimated revenue of $100,0000,000 flowing in by virtue of online credit card transactions specific to banking and loan application based services. This security policy will go on to outline the specific regulations and legislation that are in agreement with the statutory compliance criteria. Below is a recommended view of the characteristics and components of the recommended security based policy. Taking up the stake of the performance, cost, and security of maintaining the Linux, and open source infrastructure will be within the premise of the defined roles and responsibilities. Annual cost savings are estimated to amount to $4,000,000 (approx) by virtue of implementation of this solution. The ‘C’-‘I’-‘A’ triad will be a crucial requirement fo the First World Savings Bank and translates to Confidentiality, Integrity and Availability respectively. Confidentiality aspect with reference to First World Savings Bank – Confidentiality refers to the principle that states...

Words: 3404 - Pages: 14

Free Essay

Food Security Issue

...Fedoroff Agric & Food Secur (2015) 4:11 DOI 10.1186/s40066-015-0031-7 Open Access REVIEW Food in a future of 10 billion Nina V Fedoroff* Abstract  Over the past two centuries, the human population has grown sevenfold and the experts anticipate the addition of 2–3 billion more during the twenty-first century. In the present overview, I take a historical glance at how humans supported such extraordinary population growth first through the invention of agriculture and more recently through the rapid deployment of scientific and technological advances in agriculture. I then identify future challenges posed by continued population growth and climate warming on a finite planet. I end by discussing both how we can meet such challenges and what stands in the way. Keywords:  Population growth, Agriculture, Domestication, Genetic modification, Technology Background Today we have enough food to meet the world’s needs. Indeed, we have an extraordinary global food system that brings food from all over the planet to consumers who can afford to buy it. The food price spike of 2008 and the resurgence of high food prices in recent years have had little impact on the affluent citizens of the developed world who spend a small fraction of their income on food. By contrast, food prices have a profound impact on the world’s poorest people. Many of them spend half or more of their income on food. During the food price crisis of 2008, there were food riots in more than...

Words: 8979 - Pages: 36

Free Essay

Eclipse

...Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Book 12 Sweep Cate Tiernan Eclipse Table of Contents Title Page Copyright Page Dedication Chapter 1 – Morgan Chapter 2 - Alisa Chapter 3 - Morgan Chapter 4 - Alisa Chapter 5 - Morgan Chapter 6 - Alisa Chapter 7 - Morgan Chapter 8 - Alisa Chapter 9 – Morgan Chapter 10 - Alisa Chapter 11 Morgan Chapter 12 - Alisa Chapter 13 – Morgan Chapter 14 - Alisa Chapter 15 – Morgan Page 1 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Book 12 Sweep Page 2 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html Cate Tiernan ECLIPSE To Stephanie Lane, with gratitude Page 3 Generated by ABC Amber LIT Converter, http://www.processtext.com/abclit.html 1 Morgan > < “Oh, please. Will you two stop already? This is disgusting,” I teased. On Ethan Sharp’s front step Bree Warren and Robbie Gurevitch tried to disentangle themselves from their lip-to-lip suction lock. Robbie gave a little cough. “Hey, Morgan.” He stood off to one side, trying to act casual—hard to do when you’re flushed and breathing hard. It was still a tiny bit of a novelty to see Robbie and Bree, my best friends from childhood, in a romantic relationship. I loved it. “Perfect timing, Sister Mary Morgan,” said Bree, pushing a hand through her minky dark hair. But she grinned at me, and I smiled back. Robbie rang Ethan’s doorbell. Ethan opened the door...

Words: 49781 - Pages: 200

Free Essay

Ideavirus

...Unleashing the Ideavirus 1 www.ideavirus.com Unleashing the Ideavirus By Seth Godin Foreword by Malcolm Gladwell ©2000 by Do You Zoom, Inc. You have permission to post this, email this, print this and pass it along for free to anyone you like, as long as you make no changes or edits to its contents or digital format. In fact, I’d love it if you’d make lots and lots of copies. The right to bind this and sell it as a book, however, is strictly reserved. While we’re at it, I’d like to keep the movie rights too. Unless you can get Paul Newman to play me. Ideavirus™ is a trademark of Do You Zoom, Inc. So is ideavirus.com™. Designed by Red Maxwell You can find this entire manifesto, along with slides and notes and other good stuff, at www.ideavirus.com. This version of the manifesto is current until August 17, 2000. After that date, please go to www.ideavirus.com and get an updated version. You can buy this in book form on September 1, 2000. This book is dedicated to Alan Webber and Jerry Colonna. Of course. Unleashing the Ideavirus 2 www.ideavirus.com STEAL THIS IDEA! Here’s what you can do to spread the word about Unleashing the Ideavirus: 1. Send this file to a friend (it’s sort of big, so ask first). 2. Send them a link to www.ideavirus.com so they can download it themselves. 3. Visit www.fastcompany.com/ideavirus to read the Fast Company article. 4. Buy a copy of the hardcover book at www.amazon.com/exec/obidos/ASIN/0970309902/permissionmarket. 5...

Words: 52238 - Pages: 209

Premium Essay

It255

... Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18

Free Essay

Bad Bug Book

...general in nature, and is intended for practical use. It is not intended to be a comprehensive scientific or clinical reference. Under the laws administered by FDA, a food is adulterated if it contains (1) a poisonous or otherwise harmful substance that is not an inherent natural constituent of the food itself, in an amount that poses a reasonable possibility of injury to health, or (2) a substance that is an inherent natural constituent of the food itself; is not the result of environmental, agricultural, industrial, or other contamination; and is present in an amount that ordinarily renders the food injurious to health. The first includes, for example, a toxin produced by a fungus that has contaminated a food, or a pathogenic bacterium or virus, if the amount present in the food may be injurious to health. An example of the second is the tetrodotoxin that occurs naturally in some organs of some types of pufferfish and that ordinarily will make the fish injurious to health. In either case, foods adulterated with these agents are prohibited from being introduced, or offered for introduction, into interstate commerce. Our scientific understanding of pathogenic microorganisms and their toxins is continually advancing....

Words: 91823 - Pages: 368