In this article
When you use an AI tool connected to your company's data, something important happens behind the scenes. The tool searches through your files, documents, and records to find information that helps answer your question. This process is called retrieval.
The security question is simple: when does the system check whether you are allowed to see that information? Before the search, or after?
The answer to that question changes everything.
How most AI tools handle your data
Most AI platforms that connect to company data use a method called Retrieval-Augmented Generation, or RAG. Here is how it typically works:
- You ask the AI a question.
- The system searches across all available company data to find relevant information.
- It pulls back documents, records, and text that match your query.
- It then checks whether you should be allowed to see each piece of information.
- It filters out anything you should not have access to.
- It uses what remains to generate a response.
This is called post-retrieval filtering. The system retrieves first and filters second.
On the surface, this sounds reasonable. The sensitive data gets filtered out before you see it, so what is the problem?
The problem with retrieve-then-filter
The problem is that by the time the filter runs, the damage may already be done. The AI system has already accessed the data. It has already read documents you were not supposed to see. It has already processed confidential information in memory.
Here is why that matters:
- The data was accessed. Even if the response does not show sensitive information to you, the AI model processed it. In regulated industries, the fact that a system accessed data without proper authorisation can itself be a compliance issue.
- Filters can fail. Post-retrieval filters are not perfect. They rely on correctly identifying every piece of sensitive data in the retrieved results. If a filter misses something, if it does not recognise a client name or a confidential figure, that information goes straight into the response.
- Indirect leakage happens. Even when filters catch specific data points, the AI may still be influenced by information it should not have seen. It might adjust the tone, change a recommendation, or provide context that reveals something about the filtered data without stating it directly.
- Audit trails are complicated. When your system retrieves everything and then filters, your logs show that sensitive data was accessed. Explaining to a regulator that "we accessed it but did not show it to the user" is a difficult conversation.
The core issue: Post-retrieval filtering treats data access as acceptable and tries to control what happens after. Pre-retrieval security treats unauthorised access as something that should never happen in the first place.
What pre-retrieval security actually means
Pre-retrieval security is a fundamentally different approach. Instead of searching everything and filtering later, the system checks permissions before any search begins.
Here is the process:
- You ask the AI a question.
- Before searching, the system checks who you are and what data you are allowed to access.
- It builds a search scope that only includes data you have permission to see.
- It searches within that permitted scope only.
- It generates a response using only authorised data.
The critical difference is in step two. The system decides what you can access before it looks at anything. Data you are not authorised to see is never searched, never retrieved, and never processed.
A simple way to think about it
Imagine a large office building with hundreds of filing cabinets. Each cabinet contains documents for different clients.
Post-retrieval filtering works like this: You ask a question, and an assistant walks into the building, opens every filing cabinet, reads through all the documents to find relevant ones, carries them all back to a desk, and then someone checks which documents you are actually allowed to see. The ones you should not see get put back. But the assistant already read them.
Pre-retrieval security works differently: Before the assistant enters the building, a security guard checks your badge and gives the assistant a list of which cabinets they are allowed to open. The assistant only goes to those cabinets. They never touch, open, or read anything from the restricted ones.
The result looks the same to you: you only see documents you are allowed to see. But what happened behind the scenes is completely different. In the first approach, all your data was accessed. In the second, only permitted data was ever touched.
The safest way to prevent unauthorised data exposure is to make sure unauthorised data is never accessed in the first place.
How SCRS enforces pre-retrieval security
Other Me's patent-pending SCRS (Secure Context Retrieval System) was built from the ground up around pre-retrieval enforcement. It uses a Dual-Gate architecture that applies security checks at two separate points.
Gate 1: Block Before Search
When a user sends a query, Gate 1 activates before any data retrieval begins. It evaluates the user's identity, their role, and their specific permissions. Based on this, it determines exactly which data sources, documents, and records the user is authorised to access.
Only data within that authorised scope is included in the search. Everything else is invisible to the retrieval process. It is not filtered out later. It is never part of the search in the first place.
Gate 2: Verify Before Showing
Gate 2 adds a second layer of protection. After retrieval, but before the response is shown to the user, Gate 2 verifies that every piece of information in the response falls within the user's permissions. This catches edge cases and provides defence in depth.
The two gates work together. Gate 1 prevents unauthorised access. Gate 2 confirms that nothing slipped through. It is a belt-and-braces approach to data security.
Patent-pending protection: The SCRS Dual-Gate architecture is the subject of UK Patent Application No. 2602911.6, filed by Pop Hasta Labs Ltd (UK Companies House No. 16742039).
Why this matters for your organisation
For any business that handles sensitive data, the difference between pre-retrieval and post-retrieval security is significant. Here is why:
Regulatory compliance
Under UK GDPR and the Data Protection Act 2018, organisations must ensure that personal data is only accessed by authorised individuals. Pre-retrieval enforcement makes this straightforward. If the data was never accessed, there is no unauthorised processing to explain.
Client confidentiality
Law firms and financial services companies have strict obligations around client confidentiality. With pre-retrieval security, one client's data is never accessed when another client's matter is being worked on. The separation is enforced at the search level, not patched on afterwards.
Simpler auditing
When your AI platform only accesses data that users are authorised to see, your audit logs are clean. You can demonstrate to regulators, clients, and auditors that data access was properly controlled at every step.
Reduced risk surface
Post-retrieval filtering creates a large attack surface. Every piece of data is accessed every time, and security depends on the filter working perfectly. Pre-retrieval security reduces the surface dramatically. Data that was never accessed cannot be leaked, no matter what goes wrong downstream.
How to get started
Other Me is available today with SCRS pre-retrieval security built in. Pro plans start at £24 per month, and Member plans are £15 per month per user. Enterprise pricing is available for larger organisations that need custom configurations.
The platform gives your team access to multiple AI models while enforcing data governance through the Dual-Gate architecture. Your employees get the AI tools they need. Your data stays protected.
Want to see pre-retrieval security in action? Visit Other Me to learn how the SCRS Dual-Gate architecture protects your data before any search begins.
The way your AI platform handles data retrieval is not a technical detail. It is a fundamental security decision. Make sure your organisation is on the right side of it.