dsi Billing Services

Govmail Hybrid Mail

Govmail is our hybrid mail solution that enables organisations to reroute their locally-printed documents to our secure production centres for bulk printing and mailing - achieving up to 60% reduction in costs. Supports e-doc channel shift, home worker document production, revenues and benefits printing, offsite document production and mail merge.


  • Document address and content checking
  • Mail sortation
  • Content based rules
  • User and group level filters
  • User and group level reporting
  • Append fixed forms to documents
  • Adjustable mail dates
  • Automatic content based document indexing
  • Protection against multiple letters in a pack
  • System capable of delivering full Council Tax Printing solution


  • Reduced printing costs
  • Reduced mailing costs
  • Time saved managing print, enclose and mail
  • Guards against mailing invalid addressed items
  • Reports give full visibility of mail output per user
  • End to end mail piece tracking using mailmark
  • Protection via document validation
  • Reduced mistakes in outgoing correspondence


£0.34 to £0.45 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at graeme.nye@dsigroup.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 9 5 3 5 6 9 2 2 6 4 8 8 0 0


dsi Billing Services Graeme Nye
Telephone: 07807 628701
Email: graeme.nye@dsigroup.com

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
The system is only available on Windows. Other operating systems or mobile devices can use our alternative Govmail Online web based upload service under the same account.
System requirements
  • Internet connection
  • Windows 7-10
  • Any modern web browser
  • Documents with correct address position
  • .NET 4.5

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 working day
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
None beyond testing compatibility with standard OS and browser assistive tools.
Onsite support
Yes, at extra cost
Support levels
Support Levels
Client/User Support
Our software solutions have an inbuilt help facility that enables users to report any issues, or request further assistance via email.

Primary support is provided Monday to Friday between 8am and 5.30pm.
Out-of-hours support (including weekends) can be arranged to suit particular client needs, at an additional cost.

Our software is likely to be in use during core working hours, so out-of-hours support is not ordinarily required.

System Support
Where cloud services are being provided for use outside of core working hours, our support team provide 24x7 cover to maximise system availability/up-time.

Support Costs
User email support - Included within our standard service charge.
System Support - Included within our standard service charge.

Technical Account Manager
A Technical Account Manager will be provided to manage client support requirements and to monitor system up-time and performance. Web-chat functionality can be implemented to expedite resolution to more intricate user issues.
Support available to third parties

Onboarding and offboarding

Getting started
We have guides for setup, administration and usage. We can provide a WebEx walk through and if requested can provide on site assistance.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Either through the admin controls or by request to us.
End-of-contract process
Prior to expiration of the contract period, we will initiate our end-of-contract process. This will be managed by the client Account Manager, and will be designed to ensure a risk-free cessation of services and transition to a new supplier (if appropriate).

End-of-contract process will cover:
Communication - a mechanism for communicating to end users likely to be impacted. This can be delivered via the software directly to users.

Transition Planning - a service transition plan will be agreed and documented.

In accordance with Data Protection requirements we will ensure that:

Data - all data will be deleted.
Digital Assets - all digital assets will be deleted.
Login Credentials - all login credentials will be deleted.
Software - all active software and existing system communication mechanisms will be deactivated.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
The windows desktop service can be driven by a print driver which makes it a faster process with extra options for processing before upload. The mobile service is Govmail Online which requires manual upload of documents and has scaled back options.
Service interface
Description of service interface
The admin interface allows user management, editing of data retention rules and download of reports. From our side we can update stock and other service options for a customer.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None beyond testing with standard OS and browser assistive tools.
What users can and can't do using the API
The API can be used to get real time job status and usage reports. Uploads and job management through the api skip the document processing of the UI. Api use is only recommended where our batch process mode is not an option.
API documentation
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Users can customise the basic appearance, logos and colours.
Customisation is done through simple settings files.
Customisation options are given to the admin who rolls the service out to the users.


Independence of resources
Our service has been built with excess server capacity and bandwidth for the number of users. If user numbers and demand increase we can double the capacity by rolling out another server. Due to the nature of the service the demand per user is predictable and limited. We monitor and log user numbers and demand over time.


Service usage metrics
Metrics types
The service includes usage details per user and per group, items printed, postage type, items per day.
Reporting types
  • API access
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Other
Other data at rest protection approach
Encryption of data to AES-256 standard.
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Customer user data can be exported by the admin from the admin controls.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Pipe seperated files
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • JSON
  • Pipe seperated files
  • Fixed width text

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
If using the installed option we encrypt data and documents using AES-256 before transmission.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Data is encrypted using AES-256 until it is required for print.

Availability and resilience

Guaranteed availability
We will agree and document service levels specific to each client's requirements, to ensure that the service is aligned with their operational requirements.

Availability - Our service availability guarantee will be 99.5%

We take great care in monitoring our internal and external server network 24/7/365 to make sure that the up time guarantee is observed and that the end-user services are being delivered as smoothly as possible.

As part of our guaranteed availability, we will work with each client to identify and document any rebate system, should this become applicable.
Approach to resilience
We use dedicated servers for this service so there is no load balancing with other services.

The dedicated server host provides:
Multiple UK Sites for Disaster Recovery
N+1 Data Centres
4 Hours Fix contracts with every M&E supplier
24 x 7 Fuel supplies for onsite generators
Scheduled and regular maintenance on all M&E components
Multiple Tier 1 Network Carriers
No single point of failure between Data Centre sites. If link fails traffic automatically re-routed.
Scalable architecture including multiple redundant core switches and routers
Dual independent power feeds, backed up by dual battery string Uninterrupted Power Supplies (UPS) systems
Outage reporting
We have a regular check which will send email alerts to us in case of any state changes, along with using visual ping to monitor every web page in the service. If the outage affects users emails will go out to cover type and estimated time to resolution.

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Other user authentication
Automatic user identification and validation through linking to active directory.
Access restrictions in management interfaces and support channels
Only specific users are given management access, checked on both login and ip. Additional keys are required for admin level settings.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
Re-certification on 21/4/16
What the ISO/IEC 27001 doesn’t cover
No out of scope activities
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
Final in house data process and production which is outside the cloud service side.
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We meet ISO:27001 standards, all checks and tests are documented and results stored. We have in place automated processes to ensure data is cleared after it's retention date along with monthly manual housekeeping checks. After use data is encrypted and archived for the retention term.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All components of the service have been developed within a change control system. Every change is documented and revertible for review and testing. All changes are reviewed before deployment and tested for security if thought to raise any security risks.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Threats are assessed on potential risk to service and data security.
Standard security patches are tested and deployed weekly. Any vulnerability actively affecting service would be patched within 24hrs.
We gather information by monitoring access, use and feedback to the service along with reports concerning components in use (os, db, web server, server side code components).
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We log and monitor all access to the service, highlighting unknown ip, invalid service use, or invalid api keys.
Proactive systems (fail2ban) maintain a firewall approach to catch early attacks. If security is found to be compromised we would respond immediately with the goal to remedy within 24hrs.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents are assessed on risk to service and user data security. users can report incidents through any of our methods of contact. All reported incidents are logged. Incidents cause and efforts to prevent going forwards will be documented in our change control system. Reports would be provided at request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£0.34 to £0.45 a unit
Discount for educational organisations
Free trial available
Description of free trial
Included installation, account setup, testing, document processing and return of PDF documents that would be printed and mailed if the service is made live. No documents are printed or mailed.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at graeme.nye@dsigroup.com. Tell them what format you need. It will help if you say what assistive technology you use.