GOSS Interactive Ltd

GOSS LiveChat

GOSS LiveChat enables website/intranet visitors to use instant messaging, for immediate response by your Contact Centre agents. Used by Customer Service Teams, Sales Teams and Support Teams to deliver improved levels of customer satisfaction within Local Government/Authorities/Councils, Central Government Agencies, NHS Trusts, Police Authorities and Housing Associations.


  • Manage multiple conversations efficiently and effectively.
  • Provide easy immediate access to relevant help whenever customers require.
  • Invite additional agents into conversations when required.
  • Configure pre-filled “stock” responses for use where appropriate.
  • Send dynamic responses when the customer enters certain keywords.
  • Indicate via website whether the Contact Centre is online/offline.
  • Preserve completed customer conversations in a “history” tab.
  • Allow co-browsing with the agent to find information faster.
  • Customise the GOSS LiveChat interface with your organisation’s branding.
  • Increase agent licences as demand requires.


  • Cut service delivery costs. Cheaper than face-2-face/phone operational costs.
  • Provide instant personalised help to your customers.
  • Improved customer satisfaction - quicker access to appropriate agents.
  • Customers enjoy an improved on-line experience.
  • Customers can ask complex questions easily and securely.
  • Customers receive an emailed transcript of the chat after ending.
  • 10 agent starter pack with flexible upgrades.
  • Improved customer service agent productivity with multiple concurrent chats.
  • Cross-sell and up-sell other services to customers.
  • Optional: Integrate with CRM


£250 per unit per month

Service documents

G-Cloud 9


GOSS Interactive Ltd

Simon Smith

+44 0 844 880 3637


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to GOSS CMS. Other 3rd party CMS for websites and/or intranets.
Cloud deployment model Hybrid cloud
Service constraints Planned maintenance will be agreed as required. Support for GOSS trained users.
End users: Modern browser supporting JavaScript is required. The current Windows client supplied is not MSI based installer, so not compatible with services such as Microsoft Application Virtualization or Windows Deployment Services. Roaming Profiles not supported. Technical requirements listed in Service Definition.
System requirements
  • Client website embedded link loads JavaScript hosted in GOSS cloud.
  • LiveChat Configuration process manages button images
  • Client app based on Open Source Spark IM.
  • Client app: uses XMPP protocol to connect to LiveChat service.
  • Min OS: Windows XP, Windows Vista or Windows 7.
  • Min Hard Disk: 100-150Mb Free Space, Min Processor: 1Ghz
  • Min memory: Client application requires 80 – 100Mb of memory
  • Firewall/Network restricted access required.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response from 30 mins to 4 hours depending upon incident severity/nature. UK based Service Helpdesk open 8am to 6pm Monday to Friday excluding Bank hols for emails, calls, webchat. Online ticketing available 24/7/365. Hosting Monitoring provided 24/7/365. Please refer to detailed support SLAs in the GOSS Service Definition document.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible N/A
Web chat accessibility testing N/A
Onsite support Yes, at extra cost
Support levels GOSS Support provided within the GOSS Cloud Software Service fee includes:
* Service monitoring and maintenance by a team of dedicated Network Support Engineers - maintaining and supporting hosting infrastructure and applications 24/7/365.
* Application updates and patching as required by new software releases.
* Office hours Help Desk support for GOSS trained users. Incidents are allocated a priority level appropriate to the incident/issue and responded to accordingly - see GOSS Service Definition for further details.

A Client Support Administrator is allocated to each GOSS client, yet all Help Desk staff are trained to support all clients. An Account Manager is allocated to each GOSS Client and will be in regular contact, ensuring ongoing customer satisfaction.

Additional support and consultancy can be provided based on a day rate if required. This is detailed within the separate GOSS Cloud Support Service on the Digital Marketplace. Please also refer to the GOSS Pricing and Service Definition Documents.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Configuration: The client will complete the "LiveChat Configuration Options" requirements for on-boarding. For GOSS CMS customers the CMS/website will be configured using an inline to launch the GOSS LiveChat from the customer website. For other CMS customers, a JavaScript snippet will be provided for the client to embed on the website pages intended to link to GOSS LiveChat.

Training: A GOSS LiveChat training webinar is provided to up-skill the agents in managing live chats, editing canned responses etc.

Documentation: User documentation includes a LiveChat Technical Document with install/config content.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction To be agreed with GOSS as part of Exit Plan Strategy and documented in the Call--off contract.
End-of-contract process The GOSS Exit Plan is deployed as per the initial Call-Off Agreement in line with GOSS ISO 27001 processes. The Leaver Checklist Process actions are performed within the termination period and include: Data Extraction and Transfer, Financial Settlements, GOSS/Support systems access disabled, GOSS internal system updates, Decommissioning of Servers, supply Certificate of Destruction. Whether an exit occurs as a result of Contract Expiry or Termination, GOSS Interactive will ensure a continued service, as defined in the original contract, is maintained throughout the Notice Period, that relevant data is held, transferred, returned and destroyed securely, that knowledge and documentation transfer takes place as required, and that costs, timescales, governance and legal requirements are clear and transparent.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
Customisation available Yes
Description of customisation GOSS can configure the colour and client logo, and the LiveChat online/offline logos can be customised to the customer requirements. Also users/agents can be configured to be able to listen in on other agent chats.

Initial screening conversation questions can be customised by the client. Canned responses to common questions can be customised by the client.


Independence of resources Run on an the GOSS scalable hosting infrastructure, the service itself its is configured to be managed by a capped number of agents with a capped number of concurrent chats at any one time. The service can be scaled up for additional agents for an increased fee.


Service usage metrics Yes
Metrics types Service Availability reports are published, and weekly and monthly reports mailed to the client.
Reporting types Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Reports generated and custom reports can be created via a GOSS Cloud Support Service.
Data export formats Other
Other data export formats Word
Data import formats Other
Other data import formats N/A

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks GOSS can work with individual clients to ascertain and meet protection needs, based on their individual security/service requirements. Please note additional GOSS Cloud Support fees may be applicable.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network Data in transit within our hosting environment is protected using SSL/TLS where possible. Any data flows that cannot be protected using SSL/TLS will be segregated from other clients by using dedicated virtual networks per client and environment.

Availability and resilience

Availability and resilience
Guaranteed availability 99.95% LiveChat Service availability with 99.99% Network Availability.
24/7/365 hosting support.
See GOSS Terms and Conditions for Service Credit schedule relating to Site/Network availability.
Approach to resilience The GOSS Data Centre has all standard resilience and security features in place, including independent power distribution paths, redundant Uninterrupted Power Supplies, backup generators, automatic fire suppression, resilient air conditioning, environmental monitoring, swipe card access control, intruder alarm systems and CCTV. Access to our facility can only be gained under the supervision and with approval of a GOSS Hosted Services engineer.
Due to the importance of high availability and resilience we also have the following in place:
• Redundant power supplies on all hardware connected to independent power and UPS circuits
• Redundant network connections for all inter connectivity between components
• Redundant disks and storage controls for all storage arrays
• Resilient, geographically diverse, internet connectivity from independent connectivity providers
• Internet edge intrusion prevention systems
• Offsite replication and secure storage of all backups
• Comprehensive Disaster Recovery plans for all services as part of our Business Continuity Plan
Outage reporting Monthly Service Availability reports published in client newsletter. For severe outages clients are advised via the GOSS Support Incident ticketing system.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Interface: Management interfaces restricted to GOSS administrators via unique password.

Support: Provided only to GOSS trained staff as listed in the GOSS Support System. Support provide fixes only, any system config is subject to the GOSS ISO certified Change Control procedure which requires sign-off by system admin as defined in the GOSS Service Manual.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Alcumus ISOQAR
ISO/IEC 27001 accreditation date 2 August 2013
What the ISO/IEC 27001 doesn’t cover Nothing.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes GOSS are certified in ISO 27001:2013 for Information Security Management and ISO 9001:2008 for Quality Management. All GOSS Staff are inducted and regularly trained in all relevant ISO Information Security Policies and processes as defined in the GOSS Information Security Manual. GOSS employs an ISO Manager who (reporting into the MD) is responsible for ensuring the ongoing training, deployment, enhancement of the company ISO policies and to ensure that all staff comply. Internal and external audits take place regularly to ensure ongoing compliance. The GOSS secure staff Intranet includes links to the GOSS Information Security Manual, information asset list, statement of applicability and other information. There is also secured access to additional information and processes such as the Disaster Recovery Plan/Business Continuity Plan. The Information Security Manual (ISMS) details the company Security Policy, various staff/team responsibilities, risk management, asset management, HR Security, physical/environmental security, access control, operational control, Business Continuity Management. The Senior Management team are informed of any new ISO information/issues which are then shared as appropriate across the various teams - however ALL staff have a responsibility to ensure their actions are compliant with both ISO Policies and procedures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes are assessed in line with our ISO 9001:2008 Change Control Process (details available on request), including security issues/risks/impact. Covers major releases, patches and hot fixes as required.

All components are logged and managed via Subversion to enable a full roll back to previous versions. Subversion records changes made including user-ID, date and change reason.

Code Changes audit trail includes the ability to compare versions across the entire delivery platform including Templates, Style Sheets, JavaScript and application code.

Staged deployment process across various environments. Hot Fixes may be supplied and deployed as required to address urgent security issues.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach GOSS ISO 27001:2013 certified process: constant monitoring across all major security bulletins ensures that our Development/Network Engineers are immediately notified should problems arise. Actively review OWASP news feeds to learn, adapt to, implement latest security standards in all GOSS products and services.
Appropriate corrective action is taken quickly via the deployment of application patches/hot fixes to address new threats and vulnerabilities.
Network Engineers monitor security bulletins from relevant vendors and organisations such as CERT UK, US CERT, Cisco, Red Hat, Microsoft and VMware.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach GOSS ISO 27001:2013 certified process: Network Engineers monitor security bulletins from relevant vendors and organisations such as CERT UK, US CERT, Cisco, Red Hat, Microsoft and VMware and take positive action where required in line with the GOSS ISO Security Manual.
A centralised monitoring system is used to automatically alert engineers in and out of hours, depending on the impact and the severity of the event. An event will automatically get escalated if an on call engineer does not investigate within a certain period of time as per our Incident Management Policy and SLA.
Incident management type Supplier-defined controls
Incident management approach GOSS ISO27001 Security Manual details the Incident Management Policy for the management and reporting of security incidents. The objective is to minimise the damage from security incidents and to monitor and learn from such incidents. Process for incident management covering software, hosting or client support related issues including documented call-out procedure and escalation procedure. Support process defines incident priorities and response/resolution timescales.
Users report incidents via 24/7/365 online ticketing system, or via email, phone or LiveChat during stated helpdesk hours.
Incident reports and updates are provided via the GOSS online ticketing and reporting system.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £250 per unit per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Free GOSS LiveChat trials for existing CMS clients. 6 week trial for 3 users, set-up within 3 days. No client specific branding can be applied for free trial period. Please review the LiveChat prerequisites and complete the form to start your free trial.
Link to free trial https://www.gossinteractive.com/livechat-free-trial


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑