Thus, you should work out what kind of threat you are trying to protect against, and then see if your approach would do that.
a database administrator will probably also have access to the decryption key on the web server (assuming you are thinking of using symmetric encryption). There may be no point in encrypting these coordinates - anyone who has access to your database e.g.