SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Fraud Detection Analysis
VARSHA
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
• Introduction
• Data collection & cleaning
• Exploratory data analysis
• Data pre-processing
• Model selection
• Model evaluation
• Conclusion
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Introduction
A company called Block Fraud specializes in
identifying and preventing fraud in mobile financial
transactions. Their plan is to enter the Brazilian
market by implementing a competitive pricing
strategy leveraging their high accuracy in fraud
detection.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
key metrics
• precision score : It is a metric that
measures the ability of a model to
identify relevant data points
• recall: a machine learning metric
that measures how often a model
correctly identifies positive
instances in a dataset.
• F1 score:It is a metric that
measures a model's performance
by combining precision and recall.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Click to edit
Master title
style
Data cleaning
• Handled categorical features using one-hot
encoding.
• Checked for null values and ensured all
features relevant to modeling are numeric.
• These actions form a comprehensive data
cleaning process that prepares the dataset for
effective model training. Each step ensures
that the data is in the best possible shape to
train a robust and accurate model.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Outliers:
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Exploratory Data Analysis
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Click to edit
Master title
style
Data pre-processing
• Standardized the dataset using
StandardScaler to prepare for model training.
• Applied StandardScaler to numerical features
to normalize the data, ensuring a mean of 0
and standard deviation of 1. This step helps
improve model performance, especially for
models sensitive to feature scaling.
• Identified and addressed outliers that could
skew the model’s predictions, either by
capping or removing extreme values.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Model training and Evaluation
• Chose Logistic Regression as the model for predicting fraud, a suitable
choice given the binary nature of the target variable (isFraud).
• Split the dataset into training and testing sets using train_test_split,
ensuring that the model is trained on one portion of the data and
evaluated on another to gauge its performance on unseen data.
• Model Training: Applied StandardScaler to the features in both training
and testing sets to standardize the input data, ensuring the model treats
each feature equally regardless of scale
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Model Training:
Trained the Logistic Regression model on the preprocessed and
scaled training data.
Fit the model using X_train and y_train, optimizing the model's
parameters on the training data.
Accuracy Score: Evaluated the model’s performance by calculating
the accuracy on the test set, comparing predicted labels with
actual labels in y_test.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
• Confusion Matrix: Analyzed the confusion matrix to
understand the number of true positives, true negatives,
false positives, and false negatives.
• Precision, Recall, F1-Score: Assessed precision, recall, and
F1-score to get a balanced view of model performance,
especially considering class imbalance (if any).
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
By using Logistic Regression Model
• Confusion Matrix:
True Negatives (TN): 1999
False Positives (FP): 0
False Negatives (FN): 27
True Positives (TP): 203
• Accuracy: 98.79%
• Classification Report:
• Precision for Class 1 (Fraud): 1.00
• Recall for Class 1 (Fraud): 0.88
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Financial Impact Analysis
Revenue from True Positives (Correctly Identified Fraudulent
Transactions):
Revenue per Correct Fraudulent Transaction: 25% of the transaction value
True Positives (TP): 203
Total Revenue: 203 × 25 % ×
average fraud transaction value
203×25%×average fraud transaction value
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
2.Costs from False Negatives (Missed Fraudulent Transactions):
Cost per Missed Fraudulent Transaction: 100% refund of the transaction value
False Negatives (FN): 27
Total Cost: 27×100%×V
3.Costs from False Positives (Incorrectly Identified Legitimate Transactions):
Cost per Incorrectly Identified Legitimate Transaction: 5% charge
False Positives (FP): 0 (So, the cost is $0 in this case)
4. Net Financial Impact:
The Net Financial Impact can be calculated by subtracting the total costs (from False
Negatives and False Positives) from the total revenue (from True Positives).
Net Financial Impact=(203×0.25×V)−(27×1×V)
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Click to edit
Master title style
Conclusion
• In this project, developed a model to detect
fraudulent transactions, focusing on thorough data
preparation and feature engineering.
• The net financial impact is positive, implying that your
model has a beneficial effect on the company's
revenue. For every fraudulent transaction detected,
the company earns a significant portion of the
transaction value, minus the costs associated with
missed frauds.
• If you know the average value of fraudulent
transactions (V), you can substitute it into the formula
to get the exact financial impact
.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Thank You!

More Related Content

PPTX
Fraud Analysis of Transactions: Identifying and Mitigating Risks
PPTX
Fraud Detection: Harnessing Data Science for Securing Transactions
PPTX
Fraud Detection: Innovative Approaches to Safeguarding Integrity
PPTX
Innovative Approaches to Fraud Detection: Advanced Techniques and Best Practices
PPTX
Revolutionizing Fraud Detection: Innovative Strategies for Securing Transactions
PPTX
Detecting Credit Card Fraud: An AI-driven Approach
PPTX
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
PPTX
Harnessing Machine Learning for Fraud Detection
Fraud Analysis of Transactions: Identifying and Mitigating Risks
Fraud Detection: Harnessing Data Science for Securing Transactions
Fraud Detection: Innovative Approaches to Safeguarding Integrity
Innovative Approaches to Fraud Detection: Advanced Techniques and Best Practices
Revolutionizing Fraud Detection: Innovative Strategies for Securing Transactions
Detecting Credit Card Fraud: An AI-driven Approach
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Harnessing Machine Learning for Fraud Detection

Similar to Fortifying Fraud Detection: Advanced Data Analysis Techniques for Enhanced Security (20)

PPTX
Detecting Deception: Advanced Techniques in Fraud Detection
PPTX
Detecting Deception: Advanced Fraud Detection Techniques
PPTX
Revolutionizing Fraud Detection: Innovative Strategies for Securing Transactions
PPTX
Financial Fraud Detection: Identifying and Preventing Financial Fraud
PPTX
SANGEETHA PHASE 3phasephasephasephh.pptx
PPTX
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
PPTX
MAGESHWARAN PHASEphasephasephaseh 3.pptx
PPTX
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
PPTX
Data analysis for credit card fraud detection.pptx
PPTX
Fraud Analytics
PDF
Credit Card Fraud Detection Using Machine Learning & Data Science
PDF
Credit Card Fraud Detection Using Machine Learning & Data Science
PPTX
Ai group vuvuvfcyddtdtdtss666sdyufg 2.pptx
PPTX
WT group 1 of hhggfydyxststdtd6d6d6yd6yd6yd.pptx
PPTX
PYTHON PROJECT[1] Online Fraud Fraud Detection Cybersecurity Anomaly Detec...
PPTX
Fraud Detection with Cost-Sensitive Predictive Analytics
PPTX
Short-Story-Writing 255.pptx
PPTX
Fraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
PPTX
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
PDF
A Research Paper on Credit Card Fraud Detection
Detecting Deception: Advanced Techniques in Fraud Detection
Detecting Deception: Advanced Fraud Detection Techniques
Revolutionizing Fraud Detection: Innovative Strategies for Securing Transactions
Financial Fraud Detection: Identifying and Preventing Financial Fraud
SANGEETHA PHASE 3phasephasephasephh.pptx
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
MAGESHWARAN PHASEphasephasephaseh 3.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Data analysis for credit card fraud detection.pptx
Fraud Analytics
Credit Card Fraud Detection Using Machine Learning & Data Science
Credit Card Fraud Detection Using Machine Learning & Data Science
Ai group vuvuvfcyddtdtdtss666sdyufg 2.pptx
WT group 1 of hhggfydyxststdtd6d6d6yd6yd6yd.pptx
PYTHON PROJECT[1] Online Fraud Fraud Detection Cybersecurity Anomaly Detec...
Fraud Detection with Cost-Sensitive Predictive Analytics
Short-Story-Writing 255.pptx
Fraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
A Research Paper on Credit Card Fraud Detection
Ad

More from Boston Institute of Analytics (20)

PPTX
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
PPTX
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
PPTX
Music Recommendation System: A Data Science Project for Personalized Listenin...
PPTX
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
PPTX
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
PPTX
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
PPTX
Employee Retention Prediction: Leveraging Data for Workforce Stability
PPTX
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
PPTX
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
PPTX
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
PDF
Water Potability Prediction: Ensuring Safe and Clean Water
PDF
Developing a Training Program for Employee Skill Enhancement
PPTX
Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity
PPTX
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
PPTX
Designing a Simple Python Tool for Website Vulnerability Scanning
PPTX
Building a Simple Python-Based Website Vulnerability Scanner
PPTX
Cybersecurity and Ethical Hacking: Capstone Project
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
Music Recommendation System: A Data Science Project for Personalized Listenin...
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
Employee Retention Prediction: Leveraging Data for Workforce Stability
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
Smart Driver Alert: Predictive Fatigue Detection Technology
Smart Driver Alert: Predictive Fatigue Detection Technology
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
Water Potability Prediction: Ensuring Safe and Clean Water
Developing a Training Program for Employee Skill Enhancement
Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
Designing a Simple Python Tool for Website Vulnerability Scanning
Building a Simple Python-Based Website Vulnerability Scanner
Cybersecurity and Ethical Hacking: Capstone Project
Ad

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
master seminar digital applications in india
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
01-Introduction-to-Information-Management.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
master seminar digital applications in india
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Anesthesia in Laparoscopic Surgery in India
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
01-Introduction-to-Information-Management.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O7-L3 Supply Chain Operations - ICLT Program

Fortifying Fraud Detection: Advanced Data Analysis Techniques for Enhanced Security

  • 1. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Fraud Detection Analysis VARSHA
  • 2. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Introduction • Data collection & cleaning • Exploratory data analysis • Data pre-processing • Model selection • Model evaluation • Conclusion
  • 3. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Introduction A company called Block Fraud specializes in identifying and preventing fraud in mobile financial transactions. Their plan is to enter the Brazilian market by implementing a competitive pricing strategy leveraging their high accuracy in fraud detection.
  • 4. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. key metrics • precision score : It is a metric that measures the ability of a model to identify relevant data points • recall: a machine learning metric that measures how often a model correctly identifies positive instances in a dataset. • F1 score:It is a metric that measures a model's performance by combining precision and recall.
  • 5. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Click to edit Master title style Data cleaning • Handled categorical features using one-hot encoding. • Checked for null values and ensured all features relevant to modeling are numeric. • These actions form a comprehensive data cleaning process that prepares the dataset for effective model training. Each step ensures that the data is in the best possible shape to train a robust and accurate model.
  • 6. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Outliers:
  • 7. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Exploratory Data Analysis
  • 8. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 9. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Click to edit Master title style Data pre-processing • Standardized the dataset using StandardScaler to prepare for model training. • Applied StandardScaler to numerical features to normalize the data, ensuring a mean of 0 and standard deviation of 1. This step helps improve model performance, especially for models sensitive to feature scaling. • Identified and addressed outliers that could skew the model’s predictions, either by capping or removing extreme values.
  • 10. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Model training and Evaluation • Chose Logistic Regression as the model for predicting fraud, a suitable choice given the binary nature of the target variable (isFraud). • Split the dataset into training and testing sets using train_test_split, ensuring that the model is trained on one portion of the data and evaluated on another to gauge its performance on unseen data. • Model Training: Applied StandardScaler to the features in both training and testing sets to standardize the input data, ensuring the model treats each feature equally regardless of scale
  • 11. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Model Training: Trained the Logistic Regression model on the preprocessed and scaled training data. Fit the model using X_train and y_train, optimizing the model's parameters on the training data. Accuracy Score: Evaluated the model’s performance by calculating the accuracy on the test set, comparing predicted labels with actual labels in y_test.
  • 12. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. • Confusion Matrix: Analyzed the confusion matrix to understand the number of true positives, true negatives, false positives, and false negatives. • Precision, Recall, F1-Score: Assessed precision, recall, and F1-score to get a balanced view of model performance, especially considering class imbalance (if any).
  • 13. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. By using Logistic Regression Model • Confusion Matrix: True Negatives (TN): 1999 False Positives (FP): 0 False Negatives (FN): 27 True Positives (TP): 203 • Accuracy: 98.79% • Classification Report: • Precision for Class 1 (Fraud): 1.00 • Recall for Class 1 (Fraud): 0.88
  • 14. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Financial Impact Analysis Revenue from True Positives (Correctly Identified Fraudulent Transactions): Revenue per Correct Fraudulent Transaction: 25% of the transaction value True Positives (TP): 203 Total Revenue: 203 × 25 % × average fraud transaction value 203×25%×average fraud transaction value
  • 15. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. 2.Costs from False Negatives (Missed Fraudulent Transactions): Cost per Missed Fraudulent Transaction: 100% refund of the transaction value False Negatives (FN): 27 Total Cost: 27×100%×V 3.Costs from False Positives (Incorrectly Identified Legitimate Transactions): Cost per Incorrectly Identified Legitimate Transaction: 5% charge False Positives (FP): 0 (So, the cost is $0 in this case) 4. Net Financial Impact: The Net Financial Impact can be calculated by subtracting the total costs (from False Negatives and False Positives) from the total revenue (from True Positives). Net Financial Impact=(203×0.25×V)−(27×1×V)
  • 16. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Click to edit Master title style Conclusion • In this project, developed a model to detect fraudulent transactions, focusing on thorough data preparation and feature engineering. • The net financial impact is positive, implying that your model has a beneficial effect on the company's revenue. For every fraudulent transaction detected, the company earns a significant portion of the transaction value, minus the costs associated with missed frauds. • If you know the average value of fraudulent transactions (V), you can substitute it into the formula to get the exact financial impact .
  • 17. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!