SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
C ASE STUDY



Internal Investigation by Large, Public Company
Accelerated by Software & Services from FTI
Challenge
A large, public company was facing a potential antitrust matter, and needed to conduct an
                                                                                                      Challenge:
internal audit of its data to assess risk and develop a legal strategy. Due to the matter’s
sensitivity, the company required that all the information remain at its headquarters, but            Internal audit for potential antitrust
they did not have the necessary in-house tools to conduct processing and legal review.                matter, requiring all info to remain at
                                                                                                      client’s headquarters.
Due to the required quick turnaround, the company immediately turned to its trusted
e-discovery partner, FTI Technology, to assist with processing as well as first- and
second-pass review. The company selected FTI’s powerful processing, document review and               Solution:
production software for the legal review. This included the software’s analytics features,
                                                                                                      FTI Software and professionals
which provide data mining for dissecting large data sets, metadata and content analysis,
                                                                                                      deployed on-site for secure and
and also concept clustering and visual review. Some of the unique elements of this matter
                                                                                                      rapid analysis.
included:
■■   On-site■software■and■services:■The information could not leave the company’s                     Results:
     headquarters nor the control of its IT team, necessitating a software and services
     package to be deployed on-site.                                                                  Fast and cost-effective data
                                                                                                      assessment that helped develop
■■   Short■timeframe:■While the investigation did not have a pre-set external deadline, a possible
                                                                                                      legal strategy.
     antitrust action loomed, forcing the company to understand its data as quickly as possible.

Solution
Armed with laptops loaded with FTI’s e-discovery software, FTI professionals traveled to the company’s headquarters and partnered
with the company’s legal and IT teams to deliver the software, services and consulting to ensure a cost-effective and timely review. Key
components included:

■■   Secure■control■of■data■at■company■headquarters: With all of the necessary software available on laptops, the legal team had immediate,
     secure and on-site access to an industry-leading legal review tool without incurring any additional IT or budgetary burdens.
■■   De-duplication,■processing■and■culling■of■data: After removing over 80,000 files from the servers, FTI professionals partnered with
     the company’s IT department to remove nearly two- thirds of the files and documents through de-duplication and other processing
     techniques. With additional culling, the roughly 30,000 documents were further reduced by half for legal review.
■■   Concept■extraction,■visualization■and■legal■review: With the software’s analytics features, the in-house reviewers quickly navigated the
     data set and identified the key concepts and custodians during first-pass review. Important documents were then coded for a second-
     pass review by senior counsel.
■■   On-site■project■management■and■budget■control:■With FTI professionals on-site to help project manage the entire process, the company
     received weekly status reports on the budget as well as review progress.
C ASE STUDY


        Results
        Through their use of FTI’s software and professional services, the company’s legal team was well-positioned to prepare for and respond to a
        potential antitrust matter. Specific benefits included:

        ■■   Control■of■data: The combination of FTI’s mobile team and hosted software allowed the company’s IT and legal teams to keep their
             sensitive data secure at company headquarters.
        ■■   Cost■savings:■By processing and culling, unnecessary documents were removed early in the process. This reduced the overall cost of
             legal review.
        ■■   Ease■of■use:■Lawyers with very little review experience, and new to FTI’s legal review and analytics software, were able to review and
             code well over 100 documents per hour, on average. This is especially impressive considering that the average industry review rates are
             60 documents per hour. i
        ■■   Speed:■From processing to the second-pass review, the entire project took less than a month. The extensive culling and processing
             greatly reduced the data set, and with the analytics features, the company was able to review documents faster, further reducing the total
             cost of the review.
         i
             “ECA: The High-End of Legal Decision Support,” by Barry Murphy, The eDiscoveryJournal, January 26, 2010. http://ediscoveryjournal.com/2010/01/eca/.




        For More Information or to Schedule a Demo                                    FTI Technology is a business segment of FTI Consulting that is dedicated to helping organizations
        www.ftitechnology.com                                                         protect and enhance enterprise value in an increasingly complex legal, regulatory and economic
        ftitechsales@fticonsulting.com                                                environment. Our clients rely on our software, services and expertise for matters ranging from
        North America               +1 (800) 959-8001 or                              internal investigations to large-scale litigation with global e-discovery requirements.
                                    +1 (206) 373 6565
        Europe                      +44 (0)20 3077 0500
        Australia                   +61(2) 8216 0814




©■2010■FTI■Consulting,■Inc.■FTI■Technology■is■a■business■of■FTI■Consulting,■Inc.■All■rights■reserved.■                                                                                01252010

Mais conteúdo relacionado

Mais procurados

Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3grimesjo
 
Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2Benjamin Ang
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.David Bustin
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companiesiasaglobal
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinDavid Bustin
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!AIIM International
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of ThingsPaul Hastings
 

Mais procurados (20)

Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2
 
Dss investor presentation
Dss investor presentationDss investor presentation
Dss investor presentation
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
 

Destaque

Threat From The Inside, Fti Journal
Threat From The Inside, Fti JournalThreat From The Inside, Fti Journal
Threat From The Inside, Fti JournalAlbert Kassis
 
Fti Journal Predictive Discovery
Fti Journal   Predictive DiscoveryFti Journal   Predictive Discovery
Fti Journal Predictive DiscoveryAlbert Kassis
 
Email Risk, by Albert Kassis
Email Risk, by Albert KassisEmail Risk, by Albert Kassis
Email Risk, by Albert KassisAlbert Kassis
 
Cornerstone Research Case Competition – USC 2nd Place Overall
Cornerstone Research Case Competition – USC 2nd Place Overall Cornerstone Research Case Competition – USC 2nd Place Overall
Cornerstone Research Case Competition – USC 2nd Place Overall Jonathan Tsao
 
Metadata Strategies by Albert Kassis
Metadata Strategies by Albert KassisMetadata Strategies by Albert Kassis
Metadata Strategies by Albert KassisAlbert Kassis
 

Destaque (7)

Threat From The Inside, Fti Journal
Threat From The Inside, Fti JournalThreat From The Inside, Fti Journal
Threat From The Inside, Fti Journal
 
FTC Case Study
FTC Case StudyFTC Case Study
FTC Case Study
 
Fti Journal Predictive Discovery
Fti Journal   Predictive DiscoveryFti Journal   Predictive Discovery
Fti Journal Predictive Discovery
 
Refco Case Study
Refco Case StudyRefco Case Study
Refco Case Study
 
Email Risk, by Albert Kassis
Email Risk, by Albert KassisEmail Risk, by Albert Kassis
Email Risk, by Albert Kassis
 
Cornerstone Research Case Competition – USC 2nd Place Overall
Cornerstone Research Case Competition – USC 2nd Place Overall Cornerstone Research Case Competition – USC 2nd Place Overall
Cornerstone Research Case Competition – USC 2nd Place Overall
 
Metadata Strategies by Albert Kassis
Metadata Strategies by Albert KassisMetadata Strategies by Albert Kassis
Metadata Strategies by Albert Kassis
 

Semelhante a FTI Software and Professionals Deployed On-Site for Secure and Rapid Legal Review

It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
Success Story Builder First S May 2009 Hr
Success Story Builder First S May 2009 HrSuccess Story Builder First S May 2009 Hr
Success Story Builder First S May 2009 HrAlasdair Kilgour
 
Attivio Customer Success Story - Information Services Search & Discovery
Attivio Customer Success Story - Information Services Search & DiscoveryAttivio Customer Success Story - Information Services Search & Discovery
Attivio Customer Success Story - Information Services Search & DiscoveryAttivio
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Informatica Data Integration
Informatica Data IntegrationInformatica Data Integration
Informatica Data IntegrationMainstay
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERLeonardo Couto
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValueEileen Chan
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Vinod Kashyap
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy James Deiotte
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...Executive Leaders Network
 
Generative AI for Regulatory Analysis
Generative AI for Regulatory AnalysisGenerative AI for Regulatory Analysis
Generative AI for Regulatory AnalysisNimonik
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 

Semelhante a FTI Software and Professionals Deployed On-Site for Secure and Rapid Legal Review (20)

It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Success Story Builder First S May 2009 Hr
Success Story Builder First S May 2009 HrSuccess Story Builder First S May 2009 Hr
Success Story Builder First S May 2009 Hr
 
Attivio Customer Success Story - Information Services Search & Discovery
Attivio Customer Success Story - Information Services Search & DiscoveryAttivio Customer Success Story - Information Services Search & Discovery
Attivio Customer Success Story - Information Services Search & Discovery
 
Two speed-it
Two speed-itTwo speed-it
Two speed-it
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
CGI Final
CGI FinalCGI Final
CGI Final
 
Informatica Data Integration
Informatica Data IntegrationInformatica Data Integration
Informatica Data Integration
 
IBS Assessment 1
IBS Assessment 1IBS Assessment 1
IBS Assessment 1
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINER
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital Value
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT Security
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
Generative AI for Regulatory Analysis
Generative AI for Regulatory AnalysisGenerative AI for Regulatory Analysis
Generative AI for Regulatory Analysis
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 

FTI Software and Professionals Deployed On-Site for Secure and Rapid Legal Review

  • 1. C ASE STUDY Internal Investigation by Large, Public Company Accelerated by Software & Services from FTI Challenge A large, public company was facing a potential antitrust matter, and needed to conduct an Challenge: internal audit of its data to assess risk and develop a legal strategy. Due to the matter’s sensitivity, the company required that all the information remain at its headquarters, but Internal audit for potential antitrust they did not have the necessary in-house tools to conduct processing and legal review. matter, requiring all info to remain at client’s headquarters. Due to the required quick turnaround, the company immediately turned to its trusted e-discovery partner, FTI Technology, to assist with processing as well as first- and second-pass review. The company selected FTI’s powerful processing, document review and Solution: production software for the legal review. This included the software’s analytics features, FTI Software and professionals which provide data mining for dissecting large data sets, metadata and content analysis, deployed on-site for secure and and also concept clustering and visual review. Some of the unique elements of this matter rapid analysis. included: ■■ On-site■software■and■services:■The information could not leave the company’s Results: headquarters nor the control of its IT team, necessitating a software and services package to be deployed on-site. Fast and cost-effective data assessment that helped develop ■■ Short■timeframe:■While the investigation did not have a pre-set external deadline, a possible legal strategy. antitrust action loomed, forcing the company to understand its data as quickly as possible. Solution Armed with laptops loaded with FTI’s e-discovery software, FTI professionals traveled to the company’s headquarters and partnered with the company’s legal and IT teams to deliver the software, services and consulting to ensure a cost-effective and timely review. Key components included: ■■ Secure■control■of■data■at■company■headquarters: With all of the necessary software available on laptops, the legal team had immediate, secure and on-site access to an industry-leading legal review tool without incurring any additional IT or budgetary burdens. ■■ De-duplication,■processing■and■culling■of■data: After removing over 80,000 files from the servers, FTI professionals partnered with the company’s IT department to remove nearly two- thirds of the files and documents through de-duplication and other processing techniques. With additional culling, the roughly 30,000 documents were further reduced by half for legal review. ■■ Concept■extraction,■visualization■and■legal■review: With the software’s analytics features, the in-house reviewers quickly navigated the data set and identified the key concepts and custodians during first-pass review. Important documents were then coded for a second- pass review by senior counsel. ■■ On-site■project■management■and■budget■control:■With FTI professionals on-site to help project manage the entire process, the company received weekly status reports on the budget as well as review progress.
  • 2. C ASE STUDY Results Through their use of FTI’s software and professional services, the company’s legal team was well-positioned to prepare for and respond to a potential antitrust matter. Specific benefits included: ■■ Control■of■data: The combination of FTI’s mobile team and hosted software allowed the company’s IT and legal teams to keep their sensitive data secure at company headquarters. ■■ Cost■savings:■By processing and culling, unnecessary documents were removed early in the process. This reduced the overall cost of legal review. ■■ Ease■of■use:■Lawyers with very little review experience, and new to FTI’s legal review and analytics software, were able to review and code well over 100 documents per hour, on average. This is especially impressive considering that the average industry review rates are 60 documents per hour. i ■■ Speed:■From processing to the second-pass review, the entire project took less than a month. The extensive culling and processing greatly reduced the data set, and with the analytics features, the company was able to review documents faster, further reducing the total cost of the review. i “ECA: The High-End of Legal Decision Support,” by Barry Murphy, The eDiscoveryJournal, January 26, 2010. http://ediscoveryjournal.com/2010/01/eca/. For More Information or to Schedule a Demo FTI Technology is a business segment of FTI Consulting that is dedicated to helping organizations www.ftitechnology.com protect and enhance enterprise value in an increasingly complex legal, regulatory and economic ftitechsales@fticonsulting.com environment. Our clients rely on our software, services and expertise for matters ranging from North America +1 (800) 959-8001 or internal investigations to large-scale litigation with global e-discovery requirements. +1 (206) 373 6565 Europe +44 (0)20 3077 0500 Australia +61(2) 8216 0814 ©■2010■FTI■Consulting,■Inc.■FTI■Technology■is■a■business■of■FTI■Consulting,■Inc.■All■rights■reserved.■ 01252010