Vice President and Managing Director, China
China Expands Data Transfer Requirements for its Cybersecurity Law
As I explained earlier in my blog about understanding China’s Cybersecurity Law, China is unveiling its Cyber sovereignty strategy by releasing regulations, policy statements and guidelines over time. The latest release was on April 11, 2017, when the Cybersecurity Administration of China (CAC) released their draft of “Security Assessment Measures for Cros...
China’s Cybersecurity Law: Objectives, Compliance and Business Recommendations
It all started with Edward Snowden in June 2013 when he revealed to the world that governments (including US and China) were actively collecting information on its citizens. That wake-up call spawned the global cyber awareness that prompted the EU Cybersecurity Strategy in 2013, followed by Japan and the...
What Predictive Coding Court Rulings Can Teach Us
Given the efficiencies and benefits of predictive analytics – it’s no surprise that it has been getting a lot of press over the past few years. Yet, there are relatively few cases where the case law explicitly references predictive analytics. Judge Andrew Peck has been an important influence in advocating for...
Maintaining a Great Wall of Data Control in eDiscovery
Recently I had a meeting with an attorney at a respected law firm here in Shanghai. We were discussing the various aspects of her firm’s requirements that we are fulfilling as her digital forensic investigations and eDiscovery services provider. In a country where data security, privacy and management are high...
International eDiscovery: How to Handle Data Transfer Restrictions in China
With investigations and litigation becoming more common in China, there has been a growing need for eDiscovery services to be established inside the Great Chinese Firewall. Frankly, the concept of eDiscovery is new to China, and the procedures surrounding it are still developing. In a country where discovery simply isn’t pr...
Find Important Documents in Opposing Counsel Productions with Analytics
The benefits of using predictive coding and Technology Assisted Review (Predictive Analytics) are well documented and understood. Most of the focus thus far has been on applying the technology for outbound document review as a part to reduce burden and costs. However, there are always at least two sides to...
Cloud ESI in eDiscovery: Best Practices for Corporate Counsel
This post was co-authored by Tom Groom and Peter Coons. Cloud computing continues to expand at a rapid pace; businesses use the ubiquitous “cloud” for everything from communication to collaboration, accounting and document storage. Regardless of the size of the organization, cloud computing provides its users significant cost savings and impr...
UTC, GMT, ESI and eDiscovery: It's About Time
This post explains the UTC time standard, how it differs from GMT, and why it is best practice to process and produce ESI in UTC for eDiscovery. As the world continues to mature into a global economy, the likelihood of eDiscovery spanning multiple time zones becomes more likely than ever...
CAL, TAR and a dash of ESI: Predictive Analytics Acronyms You Need to Know
This post defines common eDiscovery acronyms as well as providing best practices for predictive analytics and SPL, SAL and CAL methods. You might not have ever considered eDiscovery and cooking as something that goes together but they follow similar processes. For eDiscovery, it is critical to follow written protocols for...
Handling Cloud-Based ESI in eDiscovery: Best Practices for Corporate Counsel (Part 2)
This article was originally published on InsideCounsel.com. The cloud is forever changing the dynamics of computing. Cloud solutions make economic and logistical sense for a sustainable approach to the modern demands of the ever-expanding digital universe. Companies of any size have access to scalable resources of processing power, immediate...
Predictive Analytics: What it is, How it Works and How to Apply it
This post defines predictive analytics, explains how it functions and when it can be applied during discovery to facilitate more efficient workflows. In the previous article we introduced the three different groups of analytics one can apply in discovery; structured, conceptual and predictive analytics. The focus of this article will...
The Three Groups of Discovery Analytics and When to Apply Them
This series defines predictive, structured, and conceptual analytics, and will explain how to efficiently apply each class during discovery. The use of data analytics is everywhere and used by all of us nearly every day. Sometimes we are aware we are using analytics, sometimes we are not – that’s part of t...
Need to Compare Testimony and Production Documents? Apply Analytics!
Apply analytics to find associations between testimony and discovery documents for a different perspective and to uncover additional relevant data.What if technology could suggest concepts in initial 30(b)(6) testimony that would be useful for follow-up depositions? What if it could find associations—and potential missed hot spots— between custodian test...
The Sedona Conference® Technology Review Panel 2015 Update
Hand-selected group of litigation support professionals highlight what they see on the legal technology horizon for the next five years. The Sedona Conference® Technology Review Panel or TRP (formerly RFP+ Vendor Panel) met last week to look at the current state of the legal industry and discuss things to come. T...
Artificial Intelligence and the Future of the Legal Industry
Early-generation Artificial Intelligence is already in the legal space—Bill Gates’ vision for the Microsoft Personal Agent just takes it one step further.LegalTech New York is the bellwether conference for the legal industry. One gets a great sense of “what’s to come” by walking the floor, checking out the...
How to Review Text Messages Most Efficiently
If properly collected, each text message record has metadata associated with it that can be used to stitch together the bigger story. See an example of text message review in Relativity. There are very few people today who don’t thumb text messages on their phones. We tend to treat te...
Myth-Busting Predictive Coding: Are Key Words Really Dead?
During an interview with Law Technology News, Tom Groom discusses how using predictive coding or technology assisted review (TAR) "can be an incredible cost- and time-saver" for legal teams, but it is not "an easy button." He explains how "selecting the right subject matter expert to...
ILTA 2014 Day 2 Summary: Rod Beckstrom, Geeks in the Exhibit Hall and Drinks with Dixie
Day Two Keynote: Rod Beckstrom Rod Beckstrom, a well-known cybersecurity authority, provided a thought-provoking keynote this morning which addressed the steps our connected society can take to ensure cybersecurity. Beckstrom didn’t take the typical “beware of being hacked” approach. He divided the audience in teams of three to discuss three k...
Applying Predictive Data Analytics in Discovery; Part 1
This is the first in a series of articles exploring the application of data analytics to eDiscovery. Webster’s Dictionary defines data analytics as “a process of inspecting, cleaning, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision making.”Given the fact that the vo...
Success Stories From Three Years Of Predictive Coding
This article was published as part of Equivio's "Predictive Coding Minus the Hype" educational series.D4 has been implementing predictive coding workflows since 2009. Equivio’s Zoom® predictive coding suite is at the core of D4’s predictive coding workflow. Each of the cases described in this paper were completed using Zoom....
About Tom Groom
A recognized, award-winning eDiscovery expert with over 20 years of experience in information technology, Tom Groom is an industry veteran and thought leader. In early 2016, Tom moved to Shanghai to establish D4’s China Data Center and Regional Office which is now fully operational supporting multiple customers. Tom and his team support law firms and corporate legal departments as they deal with China’s Cybersecurity Regulations, Regulatory and Internal Investigations, FCPA and Compliance Investigations as well as Cross-Border litigation and trade disputes.
For the past 15 years, Tom has focused specifically on litigation support, document review, and advanced eDiscovery search methodologies including Predictive Analytics. In that time he has presented numerous MCLEs and training seminars on ESI topics, and has received numerous awards for innovation and performance.
Tom has wide-ranging experience supporting cases involving mergers and acquisitions, antitrust, securities, environmental, patent infringement, and product liability. He has also served as a Special Master to support judicial proceedings in predictive coding and eDiscovery protocol disputes.
Tom is also D4’s go-to expert for matters involving complex electronic discovery services, use of predictive analytics, production coordination, high-volume imaging efforts, web-based repositories, and complex coding projects.
Tom holds a Master of Science in Industrial Engineering with a focus on computer information systems from Arizona State University and a Bachelor of Science in Industrial Engineering from the University of Arkansas.
Recent Articles from Discover More
Posted May 24, 2017
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law
Posted April 26, 2017
How to Use Office 365 Advanced eDiscovery to Prioritize Your Review
Posted April 21, 2017
American Bar Association Section of International Law | 2017 Spring Meeting in Washington DC
Posted April 19, 2017
Office 365 Enterprise E5: 6 Features That Could Benefit Your Business
Posted April 12, 2017
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
Posted April 05, 2017
ESI Data Mapping Basics for eDiscovery