additional data validation and security that methods called from internal code do not need. See Tutorial 5 for an example of how to correctly design this behavior.