Security & trust
at Function

Your data privacy is our priority.

Security illustration

Your health data, 
protected at every level

<svg width="100%" height="100%" viewBox="0 0 14 16" fill="none" xmlns="http://www.w3.org/2000/svg">
<g clip-path="url(#clip0_20251_219431)">
<path d="M4.5 4V6H9.5V4C9.5 2.625 8.375 1.5 7 1.5C5.59375 1.5 4.5 2.625 4.5 4ZM3 6V4C3 1.8125 4.78125 0 7 0C9.1875 0 11 1.8125 11 4V6H12C13.0938 6 14 6.90625 14 8V14C14 15.125 13.0938 16 12 16H2C0.875 16 0 15.125 0 14V8C0 6.90625 0.875 6 2 6H3ZM1.5 8V14C1.5 14.2812 1.71875 14.5 2 14.5H12C12.25 14.5 12.5 14.2812 12.5 14V8C12.5 7.75 12.25 7.5 12 7.5H2C1.71875 7.5 1.5 7.75 1.5 8Z" fill="#B05A36"/>
</g>
<defs>
<clipPath id="clip0_20251_219431">
<rect width="14" height="16" fill="white"/>
</clipPath>
</defs>
</svg>

Private by design
All health information is encrypted. You control who can see your data. We never sell or share it with advertisers or data brokers. For more information, see our privacy policy.

<svg width="100%" height="100%" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.8125 3.96875C1.625 4.0625 1.53125 4.21875 1.53125 4.375C1.53125 7.25 2.71875 12.1562 7.34375 14.375C7.4375 14.4375 7.59375 14.4375 7.6875 14.375C12.3125 12.1875 13.5 7.25 13.5312 4.375C13.5312 4.21875 13.4062 4.0625 13.25 3.96875L7.53125 1.5625L1.8125 3.96875ZM13.8125 2.59375C14.5 2.90625 15.0312 3.5625 15.0312 4.375C15 7.5 13.7188 13.1562 8.34375 15.75C7.8125 16 7.21875 16 6.6875 15.75C1.3125 13.1562 0.03125 7.5 0.03125 4.375C0 3.5625 0.53125 2.90625 1.21875 2.59375L7.09375 0.09375C7.21875 0.03125 7.375 0 7.53125 0C7.65625 0 7.8125 0.03125 7.9375 0.09375L13.8125 2.59375ZM11.0625 6.53125L7.0625 10.5312C6.75 10.8438 6.28125 10.8438 6 10.5312L4 8.53125C3.6875 8.25 3.6875 7.78125 4 7.5C4.28125 7.1875 4.75 7.1875 5.0625 7.5L6.53125 8.96875L10 5.5C10.2812 5.1875 10.75 5.1875 11.0625 5.5C11.3438 5.78125 11.3438 6.25 11.0625 6.53125Z" fill="#B05A36"/>
</svg>

Secure by default
Security is built into every layer of Function. From authentication to infrastructure, we use strong encryption, trusted identity controls, and modern security tooling to keep your information protected without you needing to do anything extra.

<svg width="100%" height="100%" viewBox="0 0 16 17" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M14.5 8.34375C14.5 6.03125 13.25 3.90625 11.25 2.71875C9.21875 1.5625 6.75 1.5625 4.75 2.71875C2.71875 3.90625 1.5 6.03125 1.5 8.34375C1.5 10.6875 2.71875 12.8125 4.75 14C6.75 15.1562 9.21875 15.1562 11.25 14C13.25 12.8125 14.5 10.6875 14.5 8.34375ZM0 8.34375C0 5.5 1.5 2.875 4 1.4375C6.46875 0 9.5 0 12 1.4375C14.4688 2.875 16 5.5 16 8.34375C16 11.2188 14.4688 13.8438 12 15.2812C9.5 16.7188 6.46875 16.7188 4 15.2812C1.5 13.8438 0 11.2188 0 8.34375ZM7.25 4.09375C7.25 3.6875 7.5625 3.34375 8 3.34375C8.40625 3.34375 8.75 3.6875 8.75 4.09375V7.96875L11.4062 9.71875C11.75 9.96875 11.8438 10.4375 11.625 10.7812C11.375 11.125 10.9062 11.2188 10.5625 10.9688L7.5625 8.96875C7.375 8.84375 7.25 8.59375 7.25 8.34375V4.09375Z" fill="#B05A36"/>
</svg>

Smart, continuous protection
Our platform uses real-time monitoring, automated threat detection, and always-on scanning to stop issues before they reach you.

<svg width="100%" height="100%" viewBox="0 0 14 16" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M12.5 2.6875H12.4688C12.3125 2.53125 11.9688 2.34375 11.4375 2.15625C10.375 1.78125 8.78125 1.5 7 1.5C5.1875 1.5 3.59375 1.78125 2.53125 2.15625C2 2.34375 1.65625 2.53125 1.5 2.6875V5.46875C1.90625 5.6875 2.46875 5.90625 3.1875 6.09375C4.25 6.34375 5.5625 6.5 7 6.5C8.40625 6.5 9.71875 6.34375 10.7812 6.09375C11.5 5.90625 12.0625 5.6875 12.5 5.46875V2.6875ZM12.5 7.125C12.0625 7.28125 11.625 7.4375 11.125 7.5625C9.9375 7.84375 8.5 8 7 8C5.46875 8 4.03125 7.84375 2.84375 7.5625C2.34375 7.4375 1.90625 7.28125 1.5 7.125V9.46875C1.90625 9.6875 2.46875 9.90625 3.1875 10.0938C4.25 10.3438 5.5625 10.5 7 10.5C8.40625 10.5 9.71875 10.3438 10.7812 10.0938C11.5 9.90625 12.0625 9.6875 12.5 9.46875V7.125ZM1.5 13.3125V13.3438C1.6875 13.4688 2 13.6875 2.53125 13.875C3.59375 14.25 5.1875 14.5 7 14.5C8.78125 14.5 10.375 14.25 11.4375 13.875C11.9688 13.6875 12.3125 13.4688 12.4688 13.3438L12.5 13.3125V11.125C12.0625 11.2812 11.625 11.4375 11.125 11.5625C9.9375 11.8438 8.5 12 7 12C5.46875 12 4.03125 11.8438 2.84375 11.5625C2.34375 11.4375 1.90625 11.2812 1.5 11.125V13.3125ZM12.5625 13.25L12.5312 13.2812C12.5625 13.25 12.5625 13.25 12.5625 13.25ZM1.4375 13.25C1.4375 13.25 1.4375 13.25 1.4375 13.2812C1.4375 13.25 1.4375 13.25 1.4375 13.25ZM1.4375 2.78125V2.75V2.78125ZM12.5625 2.75V2.78125V2.75ZM14 13.5C14 14.9062 10.8438 16 7 16C3.125 16 0 14.9062 0 13.5V2.5C0 1.125 3.125 0 7 0C10.8438 0 14 1.125 14 2.5V13.5Z" fill="#B05A36"/>
</svg>

Responsible with data and AI
We've built Function with responsible technology from the start. Any use of AI at Function follows strict privacy and security controls.

*Questions? Reach out to security@functionhealth.com.

Independently verified security

Trusted third parties regularly assess Function to ensure it meets the highest standards for data protection.
Ongoing security reviews
Our platform is routinely evaluated by independent auditors to ensure systems stay ahead of evolving threats.
SOC 2 Type II compliant
Function meets rigorous standards for data security and privacy, with controls independently assessed over time.
HIPAA-aligned
We follow key requirements of the HIPAA Security Rule to help safeguard sensitive health data.