Who Can Ask What: Governing RAG Queries and Answers

The governance of Retrieval-Augmented Generation (RAG) assistants focuses on access control and risk management during the "Use" stage. Key risks include access leakage, over-general answers, adversarial queries, and misleading confidence. Implementing role-aware retrieval, constraining query types, ensuring transparency in answers, and monitoring usage patterns are essential for effective governance.

Measuring What Matters: KPIs for GenAI and Agent Governance

The content discusses the importance of concrete metrics in AI governance using the DASUD framework. Key principles include measuring behaviour, focusing on leading indicators, and aligning metrics with business goals. It outlines specific metrics for the Design, Acquire, Store, Use, and Delete stages of AI systems, emphasising systematic governance throughout the AI lifecycle.

Acquire and Store in RAG: Governing Your Vector Stores and Knowledge Bases

The content discusses the importance of knowledge governance in designing a RAG (Retrieval-Augmented Generation) assistant, focusing on two main aspects: acquisition of content and its storage. It emphasises selecting appropriate sources, cleaning and tagging content, and ensuring effective document management over time, including version control and retention policies.

Designing RAG Assistants: What Knowledge They May (and May Not) Use

A Retrieval-Augmented Generation (RAG) assistant enhances assistance by combining a language model with a document retrieval layer. Effective design focuses on defining its mission, selecting appropriate knowledge domains, classifying content, and addressing uncertainty. A clear design sheet guides the process, ensuring responsible knowledge management and user support in various contexts.

Governing Agent Memory: State, Segmentation, and Reset

Adding memory to AI agents enhances their helpfulness but introduces governance challenges regarding what data is stored, its duration, visibility, and potential leaks. Effective memory management involves segmenting data by scope and sensitivity, establishing storage rules, enabling user control, limiting access, and ensuring proper reset mechanisms to mitigate risks of data misuse.