Security best practices for Granola meeting data. Use when implementing security controls, reviewing data handling, or ensuring compliance with security policies. Trigger with phrases like "granola security", "granola privacy", "granola data protection", "secure granola", "granola compliance".
6.4
Rating
0
Installs
Security
Category
Well-structured security reference guide with comprehensive coverage of Granola's security features, data handling, access controls, compliance requirements, and incident response procedures. The description clearly indicates when to use this skill. Task knowledge is strong with detailed checklists, configuration tables, and actionable procedures. Structure is logical with clear sections and visual aids (data flow diagram, tables). However, novelty is limited as this is primarily a reference document that aggregates publicly available security information; a CLI agent could gather similar information through web searches and documentation queries, though this skill does provide convenient consolidation and meeting-specific security workflows.
Loading SKILL.md…