Sb 2529 Research Paper

Improved Essays
I am an undergrad Human Biology student studying nutrition at the University of Wisconsin Green Bay. I am asking you to cosponsor the CONC US SB 2529 (or CONG US HR 4617) bill that would amend the Richard B. Russell National School Lunch Act requiring that the Buy American purchases for the school lunch program include fish harvested within United States waters, and for other purposes.

Fish caught outside of US waters runs a higher risk for contamination by substances banned in the United States. Most of the seafood the US consumes is imported, with 80-90% being imported and half of that is farm raised. Individuals who consume imported seafood are exposed to whatever level of safety practices exist in the country of origin. Although the US has many regulations in place regarding food safety, it is not a perfect system. Because of the large volume, the majority of fish imported for consumption in the United States is not able to be tested. According to FDA officials, in order to ensure that imported seafood is safe and meets correct HACCP requirements, the country needs to have equivalent processes or a compliant agreement set up with the FDA. So far no country has been able to meet these equivalences or had compliant practices. If a country does not have an agreement with the FDA, a record showing that their products have been processed according to HACCP is required as an alternative. Less than 1/3 of importers inspected by the FDA had the required documentation to demonstrate compliance. Even when the FDA unearths major problems in a country, they fail to follow up and do not require automatic examination of the products still entering the US from the country. Farm raised fish, prevalent in foreign countries, are often times fed meals that are laced with banned substances. In China, some farm raised fish have been found to contain antibiotics, including leuco-malachite green found in tilapia. The FDA has banned this substance since 1983 due to its serious toxicity. Alarmingly enough, nearly 1/3 of US tilapia comes from China. An independent study in North Carolina found Formaldehyde in imported fish from Asia as well. This brings to light the holes in safety regulating organizations in charge of imported seafood. Even though the risk for natural contamination is always present, the US has strict agencies that work to increase the safety of seafood domestically. The FDA, PREDIT model, EDF, NOAA, and HACCP all play a role in seafood safety. The US fishery society and NOAA work hard to regulate the sustainability of the US fishing system but the same cannot be said for foreign caught seafood. Which is often overfished and sometimes illegally caught and sold. This bill would support the American fishing industry and their families.
…show more content…
The increase in spending would help assist the industry in more than an economical way, but ecologically as well. The reduction of the number of overseas fish exports would help to increase the amount of US jobs, as canneries and fish processing facilities would need to increase to meet American demand. Fish that has been wild caught in these waters, not only support the fisherman of America, but also have a healthier nutrient profile. As the majority of imported fish is farmed and can be exposed to harmful and banned chemicals in their feed. As a nation, we do not want the children utilizing the National School Lunch Program exposed to potentially

Related Documents

  • Decent Essays

    Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Microsoft Hyper-V Server 2012 R2 is a server designed for virtual machine (VM). Virtualization is creation include storage, device, operation system as virtual rather than physical. Almost similar to VMware vSphere as virtual machine. VMware vSphere is cost for VMware install on server. But the features will be available than Microsoft Hyper-V Server 2012 R2 because it is free virtual machine for stand-alone.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Form VTR-271 Power of Attorney to Transfer Motor Vehicle Form VTR-271, Power of Attorney to Transfer Motor Vehicle is a legal document and it is in line with the regulations and requirements of the Texas Department of Motor Vehicles. The document grants the rights to an attorney to take action on behalf of you as and when necessary pertaining the transactions related to the motor vehicle described in the power of attorney. As per state law, falsifying information on this form VTR-271 is third degree felony. The power of attorney grants the rights to apply for initial registration, title, and/or certified copy of title. Read the note on clauses that prohibit the appointment of an attorney under various conditions carefully.…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Paragraph 3 - Identical twins are different in so many ways. Take for example the Bonnie and Brenda twins, they are identical twins, but different in so many ways. They were born as identical twins, and one became transgender. Another set of twins Anais and Sam they were raised from different parents, and raised in different countries. One of them was an actress and the other was a fashion designer.…

    • 201 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    2. According to the Daily Beast, the FDA oversees about 80 percent of our food supply (Warner). 3. Just about 3,000 people per year in America die and 130,000 are hospitalized due to foodborne illnesses…

    • 1396 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Required Uniform Assignment: Interdisciplinary Care Gary Grant Chamberlain College of Nursing NR340: Critical Care Nursing Required Uniform Assignment: Interdisciplinary Care Background information Demographics: 65-year-old black male; No known allergies; Full code status History of present illness: Patient presents to the Emergency Department with complaints of stroke like symptoms. Patient is visibly weak on the left side and slurred speech. Relevant past medical and surgical history: Patient has a history of hypertension and diabetes.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    In fact, 40% of salmon caught in commercial fishing zones in Alaska were bred and released from a hatchery. Without this supplement to the Alaskan salmon population their population numbers would be much lower. Aquaculture could also be a way to stimulate the American economy. The US has almost 20,000 miles of coastline, which mean we have a massive amount of territory for fish farms in the ocean. In 2011 the US had an 11.2 billion dollar trade deficit for seafood.…

    • 2035 Words
    • 9 Pages
    Superior Essays