Counterfeit Medicines and Criminal Organisations

Total Page:16

File Type:pdf, Size:1020Kb

Counterfeit Medicines and Criminal Organisations Study report COUNTERFEIT MEDICINES AND CRIMINAL ORGANISATIONS - All rights reserved to IRACM - 2 Eric Przyswa, Research Fellow Mines ParisTech in the Centre for Research on Risks and Crises, wrote this report under the leadership and initiative of the Institute of Research against Counterfeit Medicines (IRACM). The author writes in many French and foreign academic reviews (Hermès, Futuribles, Tribune de la santé, Information and Society, etc.) and conducts research on the human safety. The report is available in its entirety on: www.iracm.com. Institut de Recherche Anti-Contrefaçon de Médicaments 54 avenue Hoche 75008 Paris - France [email protected] IRACM – September 2013 - All rights reserved to IRACM - 3 - All rights reserved to IRACM - 4 COUNTERFEIT MEDICINES AND CRIMINAL ORGANIZATIONS IRACM and Eric Przyswa - All rights reserved to IRACM - 5 Table of contents Foreword __________________________________________________________________________ 9 Introduction _______________________________________________________________________ 11 I. Medicine counterfeiting, criminal organisations and cybercrime __________________________ 13 I.1. Counterfeiting, falsification and medicines ___________________________________________ 13 I.2. State of play __________________________________________________________________ 16 In light of this assessment of counterfeit medicines, how can a more specific analysis be made of the criminal organisations involved in this ever-growing illicit trafficking? __________________________ 23 I.3. Criminal organisations and counterfeiting ____________________________________________ 23 I.3.a. Definition of criminal organisations ______________________________________________ 24 I.3.b. Criminal organisations and counterfeit medicines: a ‘structural hole’ logic ________________ 26 I.4. Cybercrime and counterfeiting ____________________________________________________ 30 I.4.a Definition __________________________________________________________________ 30 I.4.a Types of cybercrime _________________________________________________________ 31 II. Realities of the « counterfeit medicines and criminal organisations » combination __________ 35 II.1. Small-sized criminal organisations (two to five persons) ________________________________ 36 II.2. Medium-sized transnational criminal organisations (about 10 persons) _____________________ 37 II.2.a. Wuppertal case ____________________________________________________________ 37 II.2.b. Arnaud B. case ____________________________________________________________ 38 II.2.c. Peter Gillespie case _________________________________________________________ 38 II.3. Large-scale and transnational criminal organisations __________________________________ 39 II.3.a. RxNorth case ______________________________________________________________ 40 II.3.b. The ‘Jordanian-Chinese’ network ______________________________________________ 42 II.3.c. The ‘Avastin’ network _______________________________________________________ 46 II.4. Crime in China ________________________________________________________________ 49 II.4.a. Crime and exports from China ________________________________________________ 49 II.4.b. The case of mainland China __________________________________________________ 51 II.4.c. Evolution of criminal organisations in China ______________________________________ 52 II.5. Mafia groups, terrorism and financing ______________________________________________ 54 II.5.a. Mafia organisations _________________________________________________________ 54 II.5.b. Terrorism _________________________________________________________________ 57 II.5.c. Money laundering __________________________________________________________ 58 II.6. Cybercrime and counterfeit medicines ______________________________________________ 59 II.6.a. Cyberspace and criminality ___________________________________________________ 59 II.6.b. Cybercrime techniques ______________________________________________________ 60 II.6.c. Online pharmacies __________________________________________________________ 66 II.6.d. Concrete cases to illustrate the ‘cybercrime – counterfeit medicine’ combination __________ 70 II.7. A summary of the criminal organisations involved in counterfeiting medicines: organisational challenges _______________________________________________________________________ 76 II.7.a. ‘Real’ criminal networks and medicine counterfeiting _______________________________ 76 II.7.b. ‘Virtual’ criminal networks and counterfeit medicines _______________________________ 79 III. Criminological issues and recommendations _________________________________________ 85 III.1. Shaking up criminological concepts _______________________________________________ 85 III.1.a. A partially suited theoretical view ______________________________________________ 85 III.1.b. The novel nature of criminological concepts linked to medicine counterfeiting ___________ 87 III.2. Considerations to counter this phenomenon _________________________________________ 94 III.2.a. The issue of assessing the ‘crime – counterfeit medicines’ combination ________________ 94 III.2.b. Improving the analysis of the problem through centralised intelligence _________________ 96 III.2.c. The issue of law enforcement _________________________________________________ 98 III.2.d. The issue of prevention ____________________________________________________ 100 - All rights reserved to IRACM - 6 III.2.e. The importance of whistleblowers and experts __________________________________ 102 III.2.f. Internet specificities ________________________________________________________ 105 Conclusion _______________________________________________________________________ 111 APPENDICES _____________________________________________________________________ 115 Glossary of acronyms _____________________________________________________________ 116 List of interviews (in alphabetical order) _______________________________________________ 117 Bibliographic references ___________________________________________________________ 118 - All rights reserved to IRACM - 7 - All rights reserved to IRACM - 8 Foreword Today, drug counterfeiting is a rapidly growing phenomenon in both developed and developing countries. The number of victims is rising, as is the income derived - almost with impunity - from transnational organized crime. The International Institute of Research against counterfeit Medicines (IRACM) intends to devise measures to better understand the phenomenon, educate and motivate leaders, rally public opinion, warn potential victims and to facilitate the implementation of strategies related to these issues, both from governments and the international community. This is the IRACM’s very reason for existing. Drug counterfeiting is primarily a ‘dark figure’, and most likely a considerable one. The effectiveness and credibility of the solutions are subject to a systematic and comprehensive understanding of the phenomenon, all its aspects, its mechanisms and the strategy of organized crime, which, in many parts of world, has become a leading activity. This is why the IRACM decided to support the creation of an in-depth study and instructed a particularly competent researcher in the field, Eric Przyswa, to conduct it. The work he has achieved is substantial and we now know more thanks to him. He has written a very full report, which, once published, will no doubt be a milestone in the understanding of the role of organized crime in drug counterfeiting and the implications and effects of these truly transnational crimes. Transnational because they thrive in the wake of globalization by exploiting the destitution in poor countries and the credulity of the people in rich countries. Through this report, the IRACM wishes to inform as many citizens of the world as possible of the dangers and threats it has revealed, and to ensure that policymakers take them into account to implement the necessary action, contain organized crime, protect society and safeguard the rule of law in our countries against the power these criminals have gained. Bernard Leroy, Director of IRACM - All rights reserved to IRACM - 9 - All rights reserved to IRACM - 10 Introduction The combat against counterfeiting started during the 1980s and, at that time, was limited to sectors where it was frequently the consumer who asked for the product, and was even party to the purchase. Above all, it is only since the start of the 2000s that the situation expanded substantially particularly with the liberalisation of the WTO1, technological developments, containerisation and the significance of China as the world's factory. On the other hand, it was only later that counterfeiting seemed to affect the pharmaceutical sector, at least from the industrial point of view. Studies and reports have covered the involvement of organised crime in ‘traditional’ counterfeiting, particularly in creative industries (luxury goods, audiovisual). Nevertheless, even if there are more and more discussions on the topics of ‘counterfeit medicines’ and ‘organised crime’, very few researchers have analysed the relationship between the two phenomena. Consequently, it appeared that such a report should be written and a dual objective was decided: - To take as objective and as rigorous a view as possible on the reality of the "counterfeiting – criminal organisations" combination in the area of medicines. - From a criminology and strategic standpoint, to give some consideration to what could be done to guide current actions. What about
Recommended publications
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • We Are All Rwandans”
    UNIVERSITY OF CALIFORNIA Los Angeles “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Film and Television by Andrew Phillip Young 2016 ABSTRACT OF DISSERTATION “We are all Rwandans”: Imagining the Post-Genocidal Nation Across Media by Andrew Phillip Young Doctor of Philosophy in Film and Television University of California, Los Angeles, 2016 Professor Chon A. Noriega, Chair There is little doubt of the fundamental impact of the 1994 Rwanda genocide on the country's social structure and cultural production, but the form that these changes have taken remains ignored by contemporary media scholars. Since this time, the need to identify the the particular industrial structure, political economy, and discursive slant of Rwandan “post- genocidal” media has become vital. The Rwandan government has gone to great lengths to construct and promote reconciliatory discourse to maintain order over a country divided along ethnic lines. Such a task, though, relies on far more than the simple state control of media message systems (particularly in the current period of media deregulation). Instead, it requires a more complex engagement with issues of self-censorship, speech law, public/private industrial regulation, national/transnational production/consumption paradigms, and post-traumatic media theory. This project examines the interrelationships between radio, television, newspapers, the ii Internet, and film in the contemporary Rwandan mediascape (which all merge through their relationships with governmental, regulatory, and funding agencies, such as the Rwanda Media High Council - RMHC) to investigate how they endorse national reconciliatory discourse.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Social Engineering Exposures
    Aon Risk Solutions Financial Services Group Client Alert: Social Engineering Exposures While social engineering can refer to many things outside of a risk management context, within the insurance world, social engineering has assumed a specific, and notable, meaning. In brief, social engineering refers to the use of identity deception to gain the confidence of an employee to induce him or her to part with an organization’s money or securities. We will explore some of the most common forms of social engineering, relevant coverage interpretations, and available coverage solutions. Where Does The Threat Arise From? While a “theft” has undoubtedly occurred in a We’re here to Social engineering attacks can come in many social engineering loss, the commercial crime empower results forms, including: policy likely has not been triggered because the If you have questions employee did not “steal” the money/securities about your specific § Phishing scams are attempts by fraudsters to coverage or want more directly, and the employee certainly did not induce individuals into providing personal information, please benefit from it. Historically, crime policies did not information such as bank account numbers, contact your Aon broker. explicitly address social engineering, thus resulting passwords, and credit card numbers aon.com in varying outcomes. § Spear phishing is an electronic communications scam targeted towards a specific individual, Relevant Cases organization, or business Although a few courts have found coverage for § Vishing, or voice phishing is the criminal social engineering losses under crime policies, practice of using social engineering over the most courts have found that social engineering telephone to gain access to private personal and losses are not covered under the policy’s financial information Computer Fraud, Funds Transfer Fraud, or Forgery § SMiShing (short for “SMS phishing”) is a coverage agreements.
    [Show full text]
  • Programming Languages Topic of Ultimate Mastery
    InternetInternet SecuritySecurity #1 PL Fencing Day • Wed Apr 27 (unless it rains) @ 3:30pm • Darden Courtyard; no experience necessary • I provide gear • I provide lesson #2 Final Projects Due Mon May 7 • The “automated testing” is a favor, not a necessity – PS5/7 is still due even if it is down (email me) #3 One-Slide Summary • Physical security and operating system security are of critical importance and must be understood. • Key issues in internet security, including buffer overruns, virus detection, spam filtering, SQL code-injection attacks, and cross-site scripting can all be understood in terms of lexing and parsing. #4 Lecture Outline • Physical Security • Operating System Security – Privileges • Viruses and Scanning • Side Channel and Non-Control Data Attacks • Spam and Filtering • SQL Injection Attacks #6 Physical Security • It is generally accepted that anyone with physical access to a machine (i.e., anyone who can open the case) can compromise that entire machine. • Given physical access ... – How would I read your personal files? – How would I leave a backdoor (rootkit) for myself? – How would I log in as you? • Ignore networked/encrypted filesystems for now ... #7 • Them: Important user, NT box, lost admin password, sad, sad, sad. • Me: No problem, change password with magic linux disk, offline NT password editor. • Them: No, no, no. Never work. NT secure. Get real. • Me: Watch. (reboot) • Them: Gasp! This floppy is dangerous! Where did you get it? • Me: Internet. Been around forever. • Them: How do we keep students from using this? • Me: Can't. Migrate. Linux. Mac. • Them: No, no, no. Just make NT safe.
    [Show full text]
  • Understanding the Business Ofonline Pharmaceutical Affiliate Programs
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs Damon McCoy Andreas Pitsillidis∗ Grant Jordan∗ Nicholas Weaver∗† Christian Kreibich∗† Brian Krebs‡ Geoffrey M. Voelker∗ Stefan Savage∗ Kirill Levchenko∗ Department of Computer Science ∗Department of Computer Science and Engineering George Mason University University of California, San Diego †International Computer Science Institute ‡KrebsOnSecurity.com Berkeley, CA Abstract driven by competition between criminal organizations), a broad corpus of ground truth data has become avail- Online sales of counterfeit or unauthorized products able. In particular, in this paper we analyze the content drive a robust underground advertising industry that in- and implications of low-level databases and transactional cludes email spam, “black hat” search engine optimiza- metadata describing years of activity at the GlavMed, tion, forum abuse and so on. Virtually everyone has en- SpamIt and RX-Promotion pharmaceutical affiliate pro- countered enticements to purchase drugs, prescription- grams. By examining hundreds of thousands of orders, free, from an online “Canadian Pharmacy.” However, comprising a settled revenue totaling over US$170M, even though such sites are clearly economically moti- we are able to provide comprehensive documentation on vated, the shape of the underlying business enterprise three key aspects of underground advertising activity: is not well understood precisely because it is “under- Customers. We provide detailed analysis on the con- ground.” In this paper we exploit a rare opportunity to sumer demand for Internet-advertised counterfeit phar- view three such organizations—the GlavMed, SpamIt maceuticals, covering customer demographics, product and RX-Promotion pharmaceutical affiliate programs— selection (including an examination of drug abuse as a from the inside.
    [Show full text]
  • Types of Fraud
    Types of Fraud Phishing A form of identity theft in which a scammer uses an authentic-looking e-mail to trick recipients into giving out sensitive personal information, such as a credit card numbers, bank account numbers, Social Security numbers or other sensitive personal information. Vishing Voice phishing is the criminal practice of using social engineering over the telephone system, most often using features facilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing. Voice phishing exploits the public's trust in landline telephone services, which have traditionally terminated in physical locations known to the telephone company, and associated with a bill-payer. The victim is often unaware that VoIP makes formerly difficult-to-abuse tools/features of caller ID spoofing, complex automated systems (IVR), low cost, and anonymity for the bill-payer widely available. Voice phishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals. SMiShing In computing, SMS phishing or smishing is a form of criminal activity using social engineering techniques. Phishing is the act of attempting to acquire personal information such as passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. SMS (Short Message Service) is the technology used for text messages on cell phones. SMS phishing uses cell phone text messages to deliver the bait to induce people to divulge their personal information. The hook (the method used to actually capture people's information) in the text message may be a website URL, but it has become more common to see a telephone number that connects to an automated voice response system.
    [Show full text]
  • 00079-141173.Pdf (5.08
    CHRIS JAY HOOFNAGLE Adjunct Full Professor School of Information School of Law Faculty Director Berkeley Center for Law & Technology August 22, 2017 University of California, Berkeley VIA THE WEB Berkeley, CA Tel: 5 Federal Trade Commission https://hoofnagle.berkeley.edu Office of the Secretary 600 Pennsylvania Avenue NW. Suite CC–5610 (Annex B) Washington, DC 20580 Re: Comment of Chris Hoofnagle on Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN–SPAM Rule, 16 CFR part 316, Project No. R711010) Dear Mr. Brown, Thank you for soliciting public comment on the CAN–SPAM Rule. My comments below focus on the need for the CAN–SPAM Rule, the costs that spam imposes on consumers and the economy, the prospect that technical interventions on intermediaries can be effective, that spam senders strategically use transaction costs to deter recipients from opting out, that senders impose privacy penalties on those who opt out, for the FTC to consider third-party lookups for email addresses to be an aggravated violation of CAN–SPAM, to revisit that the idea of a Do-Not-Email Registry, and finally, to keep the computer science literature on spam in focus. There is a Continuing Need for the CAN–SPAM Rule Because the Injuries Caused by Spam Are Economic and Social and Are on Par with Serious Crimes In a 2001 speech, FTC Chairman Timothy Muris identified spam messages as injurious under the Commission’s “harm-based” approach.1 Today, the majority of e-mail is spam. Senders of marketing e- mails can leverage the technical and economic properties of the internet to send tens of billions of messages a day.
    [Show full text]
  • Example of Trojan Horse
    Example Of Trojan Horse Hassan fled his motherliness jumps saliently or next after Gerhardt premises and clabber heroically, unicolor and catenate. Maury usually mangling flirtingly or clamour unmeaningly when genteel Kurtis brutify lest and languishingly. Lex influencing kitty-cornered if xerophilous Lucio hocus or centrifuging. And according to experts, it remains so. As with protecting against most common cybersecurity threats, effective cybersecurity software should be your front line of protection. But what if you need to form an allegiance with this person? Another type of the virus, Mydoom. Wonder Friends to read. When first developed, Gozi used rootkit components to hide its processes. What appearsto have been correctly uninstalled or malware that i get the date, or following paper describes the horse of! Please enter your password! Adware is often known for being an aggressive advertising software that puts unwanted advertising on your computer screen. In as far as events are concerned; the central Intelligence Agency has been conducting searches for people who engage in activities such as drug trafficking and other criminal activities. If someone tries to use your computer, they have to know your password. No matter whether a company favors innovation or not, today innovation is key not only to high productivity and growth, but to the mere survival in the highly competitive environment. The fields may be disguised as added security questions that could give the criminal needed information to gain access to the account later on. It is surprising how far hackers have come to attack people, eh? Run script if the backdoor is found, it will disconnect you from the server, and write to the console the name of the backdoor that you can use later.
    [Show full text]
  • Building Bridges Forpatient CARE
    2016 REGISTRATION DOCUMENT 2016 REGISTRATION Building Bridges forPATIENT CARE 2016 REGISTRATION DOCUMENT SUMMARY GENERAL INTRODUCTORY COMMENTS 2 3 GROUP’S EMPLOYEES AND ENVIRONMENTAL ISSUES 135 3.1 Human resources 136 INTRODUCTION: KEY FIGURES 3 3.1.1 Group workforce 136 3.1.2 The Group’s Human Resources policy 138 1 PRESENTATION OF IPSEN AND ITS ACTIVITY 5 3.2 Environment, Health and Safety 140 1.1 Group’s overview and strategy 6 3.2.1 Regulatory Issues 140 1.1.1 History and Development of the Company 6 3.2.2 EHS Policy 141 3.2.3 EHS 2016 Performance 142 1.1.2 Group Strategy 8 3.2.4 Internal resources 151 1.2 Group’s activity and corporate structure 9 3.2.5 2016 Ipsen UN Global Compact Communication 1.2.1 The Group’s products 9 on Progress 151 1.2.2 Major Contracts 14 3.3 Social & societal information 154 1.2.3 Research and Development 18 3.3.1 Social relations 154 1.2.4 Intellectual Property 23 3.3.2 Societal information 155 1.2.5 Main Markets 25 4 CORPORATE GOVERNANCE 1.2.6 Regulations 26 AND LEGAL INFORMATION 165 1.2.7 The Group’s Legal Structure 27 4.1 Corporate governance 166 1.2.8 Risks Factors 28 4.1.1 Presentation of the Board of Directors and the Executive Committee 166 4.1.2 Reports of the Chairman of the Board 2 FINANCIAL INFORMATION OF THE COMPANY 39 and the Statutory Auditors 186 2.1 Management report for the financial year 40 4.1.3 Compensation of directors and officers 203 2.1.1 Significant events during the year 40 4.1.4 Agreements entered into by the Group with 2.1.2 Analysis of results 41 its senior executives or principal
    [Show full text]