portolahotel.hotelwifi.com
Open in
urlscan Pro
70.233.117.66
Public Scan
Submitted URL: https://portolahotel.hotelwifi.com/
Effective URL: https://portolahotel.hotelwifi.com/portal/access?desired_url=https%3A%2F%2Fportolahotel.hotelwifi.com%2F
Submission: On August 28 via manual from US — Scanned from US
Effective URL: https://portolahotel.hotelwifi.com/portal/access?desired_url=https%3A%2F%2Fportolahotel.hotelwifi.com%2F
Submission: On August 28 via manual from US — Scanned from US
Form analysis
2 forms found in the DOMPOST /portal/access/shared_credential_login
<form id="shared_credential_login" class="uk-form" action="/portal/access/shared_credential_login" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
value="LXMp7MdcYR1p6yQlIYo4rbf7mPuSaDhqDNsehNvW9FzpYyOxaAark7Ar4SncZnt7f5072M_wE1g1eG9THq_EPw" autocomplete="off">
<input type="hidden" name="credential" id="credential" value="free" autocomplete="off">
<fieldset class="uk-fieldset">
<legend class="uk-legend"> Free Access </legend>
<div class="uk-margin">
</div>
<div class="uk-margin">
<label>
<p>
<input id="tos" class="uk-checkbox his-checkbox" type="checkbox" name="terms" value="terms" required=""> I have reviewed and agree with the <a class="uk-link-muted" href="#termsModal" uk-toggle="">Terms & Conditions</a>
</p>
</label>
<div id="termsModal" uk-modal="" class="uk-modal">
<div class="uk-modal-dialog uk-modal-body uk-animation-slide-bottom">
<button class="uk-modal-close uk-icon uk-close" type="button" uk-close=""><svg width="14" height="14" viewBox="0 0 14 14" xmlns="http://www.w3.org/2000/svg" data-svg="close-icon">
<line fill="none" stroke="#000" stroke-width="1.1" x1="1" y1="1" x2="13" y2="13"></line>
<line fill="none" stroke="#000" stroke-width="1.1" x1="13" y1="1" x2="1" y2="13"></line>
</svg></button>
<h2 class="uk-modal-title">Terms & Conditions</h2>
<p> By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the
connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your
computer. </p>
<p> Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices
that result from the transmission or download of information or materials through the internet service provided. </p>
<p> Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, the network provider reserves the right to permanently disconnect the offending device from
the wireless network. </p>
<h4>Examples of Illegal Uses</h4>
<p>The following are representative examples only and do not comprise a comprehensive list of illegal uses:</p>
<ol>
<li>Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.</li>
<li>Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other
proprietary right of any third party.</li>
<li>Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used
as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.</li>
<li>The transfer of technology, software, or other materials in violation of applicable export laws and regulations.</li>
<li>Export Control Violations</li>
<li>Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating
software, or making fraudulent offers to sell or buy products, items, or services.</li>
<li>Uttering threats;</li>
<li>Distribution of pornographic materials to minors;</li>
<li>and Child pornography.</li>
</ol>
<h4>Examples of Unacceptable Uses</h4>
<p>The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:</p>
<ol>
<li>Obscene or indecent speech or materials</li>
<li>Defamatory or abusive language</li>
<li>Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.</li>
<li>Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.</li>
<li>Facilitating a Violation of these Terms of Use</li>
<li>Hacking</li>
<li>Distribution of Internet viruses, Trojan horses, or other destructive activities</li>
<li>Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the
ability of others to effectively use the node or any connected network, system, service, or equipment.</li>
<li>Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding,
mail-bombing, denial of service attacks, and piracy of software.</li>
<li>Seeking information on passwords or data belonging to another user.</li>
<li>Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.</li>
<li>Intercepting or examining the content of messages, files or communications in transit on a data network.</li>
</ol>
<button class="uk-button uk-button-secondary uk-width-1-1 his-button uk-modal-close" type="button">Close</button>
</div>
</div>
<button name="button" type="submit" class="uk-button uk-button-secondary uk-width-1-1 his-button" data-disable-with="Please wait...">Connect</button>
</div>
</fieldset>
</form>
POST /portal/access/account_login
<form id="account_login" class="uk-form" action="/portal/access/account_login" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
value="LXMp7MdcYR1p6yQlIYo4rbf7mPuSaDhqDNsehNvW9FzpYyOxaAark7Ar4SncZnt7f5072M_wE1g1eG9THq_EPw" autocomplete="off">
<fieldset class="uk-fieldset">
<legend class="uk-legend"> Existing Users </legend>
<div class="uk-margin">
</div>
<div class="uk-margin">
<input type="text" name="login" id="login" placeholder="Username" class="uk-input his-input" autocorrect="off" autocapitalize="off">
</div>
<div class="uk-margin">
<input type="password" name="password" id="password" value="" placeholder="Password" class="uk-input his-input">
<div class="uk-form-row right-align">
<a href="/portal/access/forgot_password">Forgot password?</a>
</div>
</div>
<div class="uk-margin">
<button name="button" type="submit" class="uk-button uk-button-secondary uk-width-1-1 his-button" data-disable-with="Please wait...">Sign On</button>
</div>
</fieldset>
</form>
Text Content
63° Clear Sky FEELS LIKE: 63° HIGH: 69° LOW: 56° HUMIDITY: 77% 06:36 AM 07:41 PM * Home Expand Menu * Home HIGH SPEED INTERNET ACCESS * COMPLIMENTARY Free Access I have reviewed and agree with the Terms & Conditions TERMS & CONDITIONS By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer. Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided. Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, the network provider reserves the right to permanently disconnect the offending device from the wireless network. EXAMPLES OF ILLEGAL USES The following are representative examples only and do not comprise a comprehensive list of illegal uses: 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy. 2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party. 3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. 4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations. 5. Export Control Violations 6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. 7. Uttering threats; 8. Distribution of pornographic materials to minors; 9. and Child pornography. EXAMPLES OF UNACCEPTABLE USES The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: 1. Obscene or indecent speech or materials 2. Defamatory or abusive language 3. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. 4. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. 5. Facilitating a Violation of these Terms of Use 6. Hacking 7. Distribution of Internet viruses, Trojan horses, or other destructive activities 8. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. 9. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software. 10. Seeking information on passwords or data belonging to another user. 11. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others. 12. Intercepting or examining the content of messages, files or communications in transit on a data network. Close Connect * PREMIUM & EXECUTIVE New Users Sign Up -------------------------------------------------------------------------------- Existing Users Forgot password? Sign On PORTOLA HOTEL & SPA • TWO PORTOLA PLAZA MONTEREY, CA 93940 PORTOLA HOTEL & SPA • TWO PORTOLA PLAZA MONTEREY, CA 93940 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Need help? Call Support at (877) 254-4571 Need help? Call (877) 254-4571 Privacy Policy • Terms & Conditions PRIVACY POLICY Hotel Internet Services is dedicated to protecting your privacy and safeguarding your personally identifiable information. Our mission is to consistently exceed our guests' expectations in terms of the products and services we provide to our business and leisure travelers. We strive to create an experience that is responsive to our guests' needs by using the information you entrust us with responsibly. We respect your privacy and adhere to the principles of applicable data protection and privacy laws throughout the world. We have provided this Privacy Statement as an explanation of the information we collect, how we use it, and how the use of this information can benefit your experience on our web sites and during your relationship with us. We wish to help you make informed decisions, so please take a moment to read the sections below. We collect information about our guests and visitors to our web site so that we can provide an experience that is responsive to our guests' and visitors' needs. Information may be collected as part of: (i) fulfilling reservation or information requests, (ii) purchasing products, (iii) registering for program membership, (iv) submitting a job application, or (v) responding to communications from us (e.g., surveys, promotional offers, or reservation confirmations). We endeavor to collect information only with your knowledge and with your permission if necessary. The types of personally identifiable information that we collect may include your name, home, work and e-mail addresses, telephone and fax numbers, credit card information, date of birth, gender, and lifestyle information such as room preferences, leisure activities, names and ages of children, and other information necessary to fulfill special requests (e.g., health conditions that require special room accommodations). We may also collect non-personally identifiable information about you, such as your use of our web sites, communication preferences, travel habits, aggregated data relative to your stays, and responses to promotional offers and surveys. Purpose for Collection, Processing, and Disclosure: Collection & Use We are fully committed to providing you with information about the collection and use of personally identifiable information (PII) furnished by, or collected from, visitors while using our web sites, products and services. It is our practice not to ask you for information unless we need it or intend to use it. Some of the primary purposes for collecting your PII are as follows: providing services such as processing a transaction (e.g., making a reservation, fulfilling a request for information, or completing a product order) marketing and communications with you in relation to the products and services offered by us, our strategic marketing partners, and other trusted third parties performing market research via surveys to better serve your needs, improve the effectiveness of our web sites, your hotel experience, our various types of communications, advertising campaigns, and/or promotional activities. You will always be offered the choice not to submit your PII or to decide what communications you want to receive from us. However, doing so may cause certain transactions to become affected. For example, not providing a name will prevent the processing of reservations. Processing and Disclosure In most cases, the information you provide is added to a local or global database. In the course of processing your information, it may be necessary to transfer your PII to trusted third party service providers located in the United States and throughout the world for the purposes outlined within this Privacy Statement. As a general practice, we do not sell, rent, or give physical possession of your PII to unaffiliated third parties. Situations in which we may disclose your information to others include: when we have received your consent to do so in situations where sharing or disclosing your information is required in order to offer you products or services you desire (e.g., a vacation package) when companies or services providers that perform business activities on our behalf require such information (e.g., credit card processing, customer support services, market research administration or database management services) to comply with legal or regulatory requirements or obligations in accordance with applicable law or court order in case of emergency such as to safeguard the life, health, or property of an individual. If information is shared as mentioned above, we seek to limit the scope of information that is furnished to the amount necessary for the performance of the specific function. Unless otherwise precluded by legal process, we require third parties to protect your PII and abide by applicable privacy laws and regulations. Consent As part of our commitment to keep you informed, we may mail, e-mail, telephone, or contact you by other means to notify you of new products and services, or upcoming special offers, events, enhancements, or other relevant information that may be of interest to you. You may also receive mailings or other communications from carefully selected third parties. We always offer you the option to decline any or all of these communications by following the directions included in our e-mails or other communications, or by contacting us directly. In some cases your permission will be implied from the nature of the service requested or transaction undertaken. For example, we may collect and use personally identifiable information that you volunteer, or behavioral data or information collected in the aggregate. In addition, your permission will be deemed given for communications from us that are necessary to fulfill transactions and services that you request. Security Safeguards We recognize the importance of information security, and we are constantly reviewing and enhancing our technical, physical, and logical security rules and procedures. Financial transactions to get connected online have security measures in place to help protect your personally identifiable information against loss, misuse, and alteration while under our control. Although "guaranteed security" does not exist either on or off the Internet, we safeguard your information using both procedural and technical safeguards, including password controls, "firewalls" and the use of up to 128-bit encryption based on a Class 3 Digital Certificate. This allows for the use of Secure Sockets Layer (SSL), an encryption method used to help protect your data from interception and hacking while in transit. We may amend this Privacy Statement from time to time in order to meet changes in the regulatory environment, business needs, or to satisfy the needs of our guests, properties, strategic marketing partners, and service providers. Updated versions will be posted to our web site and date stamped so that you are always aware of when the Privacy Statement was last updated. Close TERMS & CONDITIONS By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer. Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided. Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, the network provider reserves the right to permanently disconnect the offending device from the wireless network. EXAMPLES OF ILLEGAL USES The following are representative examples only and do not comprise a comprehensive list of illegal uses: 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy. 2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party. 3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. 4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations. 5. Export Control Violations 6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. 7. Uttering threats; 8. Distribution of pornographic materials to minors; 9. and Child pornography. EXAMPLES OF UNACCEPTABLE USES The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: 1. Obscene or indecent speech or materials 2. Defamatory or abusive language 3. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. 4. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. 5. Facilitating a Violation of these Terms of Use 6. Hacking 7. Distribution of Internet viruses, Trojan horses, or other destructive activities 8. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. 9. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software. 10. Seeking information on passwords or data belonging to another user. 11. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others. 12. Intercepting or examining the content of messages, files or communications in transit on a data network. Close © 2024 Hotel Internet Services. All rights reserved. TERMS & CONDITIONS By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer. Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided. Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, the network provider reserves the right to permanently disconnect the offending device from the wireless network. EXAMPLES OF ILLEGAL USES The following are representative examples only and do not comprise a comprehensive list of illegal uses: 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy. 2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party. 3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. 4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations. 5. Export Control Violations 6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. 7. Uttering threats; 8. Distribution of pornographic materials to minors; 9. and Child pornography. EXAMPLES OF UNACCEPTABLE USES The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: 1. Obscene or indecent speech or materials 2. Defamatory or abusive language 3. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. 4. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. 5. Facilitating a Violation of these Terms of Use 6. Hacking 7. Distribution of Internet viruses, Trojan horses, or other destructive activities 8. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. 9. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software. 10. Seeking information on passwords or data belonging to another user. 11. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others. 12. Intercepting or examining the content of messages, files or communications in transit on a data network. Close