Data Security

Vet Dynamics uses Enterprise Grade security which involves 3 tier architecture.



The first foundation is the Data and Database.



The database and data are secure, behind a firewall, with restricted access.

Only select members of Vet Dynamics staff have logins and the ability to enter the server, database and tables.

The server and database is maintained and secured by purely IT systems companies (Systems Integration and Probase) who are constantly updating the security measures.

No other company or individuals can remotely access the server or database.

Backups of the server are physically removed from the building but are encrypted.



The database is designed to specifically label every row of data with the practice ID.

Any use of the database is restricted to just one practice at a time.

The practice ID has no relationship to your name or identity, it is an integer e.g. 999.

In addition there are two IDs for each practice in use in the database as another level of security.

Any external benchmarking of multiple practices involves 1 figure divided by another and the average across all practices is stored and used.

The individual practice calculations are not stored nor used in external benchmarking.



Client IDs and the client names and addresses can be stored on the server within files sent by practices.

This approach is being replaced on a practice by practice basis currently.

The new approach is to manipulate the data on the practice server and only send client IDs and never to send client names and addresses.

Client IDs without the names and addresses are stored on the database.

Client names and addresses have never been stored on the database, access to the database is not sufficient to view names and addresses.



Files from the practice are currently sent via three methods.

These methods are being replaced on a practice by practice basis currently.

The new approach is to use an end-to-end connection from your practice server to ours without leaving or storing the files anywhere between.

The method will be the File Transfer Protocol (FTP).

A secure version of the File Transfer Protocol where the files are encrypted from beginning to end is being rolled out on a practice by practice basis currently.

The bytes passing across the network cannot be accessed or diverted or spied on with this method.

This secure version uses a similar approach to how financial websites are secured.




The second tier is called Business Logic.



Business logic refers to the way the text and numbers are used and manipulated.

Your client IDs are used during the manipulation on the servers and databases we use.

The client IDs do not relate to client names.

Access to the database or business logic is not sufficient to match client IDs with client names.



The data and business tiers result in a Master file.

This Master file is kept physically within a key-controlled business centre on a server with the same security measures as in the data tier.




The third and final tier is called the Client tier.



The Master file generates many Slave files on request by select members of Vet Dynamics staff.

The Slave files cannot be used to access the Master.

One Slave file does not provide any access to another Slave file for another practice.

Anybody viewing their file cannot guess or hack another practice’s file or data.

Each Slave file has an authorisation key that is generated by a computer program.

The authorisation key has no relation to the file number, file name, practice name, practice ID, client names or client IDs.

Without the authorisation key the file cannot be viewed or accessed.

The authorisation key cannot be guessed, calculated or hacked.



The business logic and database logic in the Master are overwritten when the Slaves are generated.

The business logic is overwritten with “SELECT 0”.

The database connection is overwritten with “PermissionOnlyForVetDynamics”.


This is described as a one-way-street, the data tier can go to the business tier and go to the client tier but not vice versa.

Clients, end-users, hackers, viruses, worms, Trojans cannot go the other way from client to business to data.