Don’t see your question here? Email us at email@example.com.
TBG uses guidelines from the FDA and scientific community to select the best research papers available. Our healthcare practitioners then put the research under even closer scrutiny and consider how easily people can implement the recommendations, what recommendations will have the largest benefit, and how someone can best collaborate with their healthcare provider to determine the next steps for their health.
The research TBG uses to inform your report meets the following criteria:
We take the following research components into account for our selection:
Because of our rigorous literature review process, we only report SNPs that meet our high standards for scientific evidence. We also only include SNPs that are actionable, meaning that you will be able to use the information from your Toolbox Genomics report to improve your wellness. We continuously review more SNPs and associations, and update our reports as soon as more high-quality literature is published.
We can only include recommendations for those SNPs that were reported in your data. Sometimes, a SNP is “missing” or not reported in your raw data due to uncertainty in the original test results. We will give the most applicable recommendation if possible, but won’t include missing SNPs in your report.
No. Every time you access your results, we pull your data to generate a fresh report— we do not store your genetic data or your report results anywhere on Toolbox Genomics, nor do we use any of your data for commercial purposes. Our site only stores basic customer information (name, address, email).
Yes. We will be happy to delete any and all of your data upon request. Please submit a written request to the address below:
Toolbox Genomics, Inc.
75 Broadway, Suite 251
San Francisco, CA 94111.
All data to and from our site is encrypted using Secure Socket Layer (SSL) technology, the industry standard for secure browsing.
To address possible database breaches, our site only stores basic customer information (name, address, email). In the event of a data breach, we use Google's infrastructure that follows the latest security standards.