A development team uses an AI-powered coding assistant that suggests code snippets from its training data. The tool recently generated functions containing logic similar to a competitor's proprietary algorithm.
What should the security manager do FIRST?
A. Conduct a legal review to assess intellectual property infringement risk
B. Implement software composition analysis to detect and flag AI-generated code
C. Restrict the AI tool's network access and require human review of all outputs
D. Retrain the model on the organization's internal codebase only