Select to view the solutions available in your location.
Track orders, get results, manage personal information, and more.
Order tests, track orders, get results, and more.
Learn more about our innovative products and services that help detect cancer earlier and power smarter treatment decisions.
Exact Sciences is working to eradicate cancer by delivering a portfolio that gives providers the information they need to better serve their patients across the cancer care continuum — starting with familial risk.
Find out how our scientific rigor, quality standards, and development of future tests make us a leader in cancer testing and treatment guidance.
Exact Sciences expects the test to be available in 2025, pending approval.
Learn all about Exact Sciences, including our purpose, the people who drive it, our history, and the impact we’ve made.
The company’s commitment to community involvement keeps paying off when employees get back from giving back.
Explore stories, news, and events that highlight our innovation, technology, and people fighting cancer on all fronts.
Exact Sciences is committed to ensuring the security of products to:
Across Exact Sciences, we continuously strive to improve cybersecurity and protect information through the product lifecycle. One of the ways we collect vulnerability reports is through a formal Coordinated Vulnerability Disclosure process.
Under this policy, “research” means activities in which you:
We accept vulnerability reports through the email address productsecurity@exactsciences.com. Reports may be submitted anonymously. If you share contact information, we will acknowledge receipt of the initial email within ten (10) business days.
We suggest operating these programs in a manner consistent with existing cybersecurity standards, specifically forms of encryption (e.g., hashing, PGP encrypted email).
In order to help us triage and prioritize submissions, we recommend that your reports:
Likewise, we require that you:
At Exact Sciences, we believe industry collaboration is essential to making our products more secure. That is why we strive for cybersecurity by design, in use and through collaboration with stakeholders. Whether our partners are customers managing the cybersecurity in their own environments, the cybersecurity research community helping us better research and evaluate emerging threats, or security vendors identifying practical security solutions, we appreciate the opportunity to collaborate. When you choose to share your contact information with us, we commit to coordinating with you as openly and as promptly as possible.
All aspects of this process are subject to change without notice as well as for case-by-case exceptions. No level of response is guaranteed.