This is a security technique whereby a program has access only to a predefined set of resources and can’t therefore interfere with other programs or portions of the core OS. This limits the impact of bugs or malicious code, but can make the sharing of data between applications more difficult.