. . "Security routines may be executed as part of the software suite, preferably to verify the integrity of data transmitted and received via the DCCS, and to limit access both to the internal network from outside users, including the remote service provider, and access to remote websites or providers from the clients coupled to the internal network." . .