Basically, the users are inheriting access to the documents through object-level permissions, which gives them access to open the proof as well. Try playing with object-level permissions or locking down inherited access to documents through the access level.