CISPA Explainer #3: What Can Be Done With Information After It Is Shared?