portolahotel.hotelwifi.com Open in urlscan Pro
70.233.117.66  Public Scan

Submitted URL: https://portolahotel.hotelwifi.com/
Effective URL: https://portolahotel.hotelwifi.com/portal/access?desired_url=https%3A%2F%2Fportolahotel.hotelwifi.com%2F
Submission: On August 28 via manual from US — Scanned from US

Form analysis 2 forms found in the DOM

POST /portal/access/shared_credential_login

<form id="shared_credential_login" class="uk-form" action="/portal/access/shared_credential_login" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
    value="LXMp7MdcYR1p6yQlIYo4rbf7mPuSaDhqDNsehNvW9FzpYyOxaAark7Ar4SncZnt7f5072M_wE1g1eG9THq_EPw" autocomplete="off">
  <input type="hidden" name="credential" id="credential" value="free" autocomplete="off">
  <fieldset class="uk-fieldset">
    <legend class="uk-legend"> Free Access </legend>
    <div class="uk-margin">
    </div>
    <div class="uk-margin">
      <label>
        <p>
          <input id="tos" class="uk-checkbox his-checkbox" type="checkbox" name="terms" value="terms" required=""> I have reviewed and agree with the <a class="uk-link-muted" href="#termsModal" uk-toggle="">Terms &amp; Conditions</a>
        </p>
      </label>
      <div id="termsModal" uk-modal="" class="uk-modal">
        <div class="uk-modal-dialog uk-modal-body uk-animation-slide-bottom">
          <button class="uk-modal-close uk-icon uk-close" type="button" uk-close=""><svg width="14" height="14" viewBox="0 0 14 14" xmlns="http://www.w3.org/2000/svg" data-svg="close-icon">
              <line fill="none" stroke="#000" stroke-width="1.1" x1="1" y1="1" x2="13" y2="13"></line>
              <line fill="none" stroke="#000" stroke-width="1.1" x1="13" y1="1" x2="1" y2="13"></line>
            </svg></button>
          <h2 class="uk-modal-title">Terms &amp; Conditions</h2>
          <p> By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the
            connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your
            computer. </p>
          <p> Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices
            that result from the transmission or download of information or materials through the internet service provided. </p>
          <p> Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, the network provider reserves the right to permanently disconnect the offending device from
            the wireless network. </p>
          <h4>Examples of Illegal Uses</h4>
          <p>The following are representative examples only and do not comprise a comprehensive list of illegal uses:</p>
          <ol>
            <li>Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.</li>
            <li>Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other
              proprietary right of any third party.</li>
            <li>Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used
              as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.</li>
            <li>The transfer of technology, software, or other materials in violation of applicable export laws and regulations.</li>
            <li>Export Control Violations</li>
            <li>Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating
              software, or making fraudulent offers to sell or buy products, items, or services.</li>
            <li>Uttering threats;</li>
            <li>Distribution of pornographic materials to minors;</li>
            <li>and Child pornography.</li>
          </ol>
          <h4>Examples of Unacceptable Uses</h4>
          <p>The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:</p>
          <ol>
            <li>Obscene or indecent speech or materials</li>
            <li>Defamatory or abusive language</li>
            <li>Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.</li>
            <li>Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.</li>
            <li>Facilitating a Violation of these Terms of Use</li>
            <li>Hacking</li>
            <li>Distribution of Internet viruses, Trojan horses, or other destructive activities</li>
            <li>Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the
              ability of others to effectively use the node or any connected network, system, service, or equipment.</li>
            <li>Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding,
              mail-bombing, denial of service attacks, and piracy of software.</li>
            <li>Seeking information on passwords or data belonging to another user.</li>
            <li>Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.</li>
            <li>Intercepting or examining the content of messages, files or communications in transit on a data network.</li>
          </ol>
          <button class="uk-button uk-button-secondary uk-width-1-1 his-button uk-modal-close" type="button">Close</button>
        </div>
      </div>
      <button name="button" type="submit" class="uk-button uk-button-secondary uk-width-1-1 his-button" data-disable-with="Please wait...">Connect</button>
    </div>
  </fieldset>
</form>

POST /portal/access/account_login

<form id="account_login" class="uk-form" action="/portal/access/account_login" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
    value="LXMp7MdcYR1p6yQlIYo4rbf7mPuSaDhqDNsehNvW9FzpYyOxaAark7Ar4SncZnt7f5072M_wE1g1eG9THq_EPw" autocomplete="off">
  <fieldset class="uk-fieldset">
    <legend class="uk-legend"> Existing Users </legend>
    <div class="uk-margin">
    </div>
    <div class="uk-margin">
      <input type="text" name="login" id="login" placeholder="Username" class="uk-input his-input" autocorrect="off" autocapitalize="off">
    </div>
    <div class="uk-margin">
      <input type="password" name="password" id="password" value="" placeholder="Password" class="uk-input his-input">
      <div class="uk-form-row right-align">
        <a href="/portal/access/forgot_password">Forgot password?</a>
      </div>
    </div>
    <div class="uk-margin">
      <button name="button" type="submit" class="uk-button uk-button-secondary uk-width-1-1 his-button" data-disable-with="Please wait...">Sign On</button>
    </div>
  </fieldset>
</form>

Text Content

63°

Clear Sky
FEELS LIKE: 63°
HIGH: 69° LOW: 56°
HUMIDITY: 77%
06:36 AM 07:41 PM
 * Home
   


Expand Menu
 * Home
   


HIGH SPEED INTERNET ACCESS

 * COMPLIMENTARY
   Free Access
   
   
   I have reviewed and agree with the Terms & Conditions
   
   
   TERMS & CONDITIONS
   
   By using our internet service, you hereby expressly acknowledge and agree
   that there are significant security, privacy and confidentiality risks
   inherent in accessing or transmitting information through the internet,
   whether the connection is facilitated through wired or wireless technology.
   Security issues include, without limitation, interception of transmissions,
   loss of data, and the introduction or viruses and other programs that can
   corrupt or damage your computer.
   
   Accordingly, you agree that the owner and/or provider of this network is NOT
   liable for any interception or transmissions, computer worms or viruses, loss
   of data, file corruption, hacking or damage to your computer or other devices
   that result from the transmission or download of information or materials
   through the internet service provided.
   
   Use of the wireless network is subject to the general restrictions outlined
   below. If abnormal, illegal, or unauthorized behavior is detected, the
   network provider reserves the right to permanently disconnect the offending
   device from the wireless network.
   
   EXAMPLES OF ILLEGAL USES
   
   The following are representative examples only and do not comprise a
   comprehensive list of illegal uses:
   
    1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or
       commercial messages over the Internet using the Service or using the
       Service for activities that invade another's privacy.
    2. Intellectual property right violations - Engaging in any activity that
       infringes or misappropriates the intellectual property rights of others,
       including patents, copyrights, trademarks, service marks, trade secrets,
       or any other proprietary right of any third party.
    3. Accessing illegally or without authorization computers, accounts,
       equipment or networks belonging to another party, or attempting to
       penetrate/circumvent security measures of another system. This includes
       any activity that may be used as a precursor to an attempted system
       penetration, including, but not limited to, port scans, stealth scans, or
       other information gathering activity.
    4. The transfer of technology, software, or other materials in violation of
       applicable export laws and regulations.
    5. Export Control Violations
    6. Using the Service in violation of applicable law and regulation,
       including, but not limited to, advertising, transmitting, or otherwise
       making available ponzi schemes, pyramid schemes, fraudulently charging
       credit cards, pirating software, or making fraudulent offers to sell or
       buy products, items, or services.
    7. Uttering threats;
    8. Distribution of pornographic materials to minors;
    9. and Child pornography.
   
   EXAMPLES OF UNACCEPTABLE USES
   
   The following are representative examples only and do not comprise a
   comprehensive list of unacceptable uses:
   
    1.  Obscene or indecent speech or materials
    2.  Defamatory or abusive language
    3.  Using the Service to transmit, post, upload, or otherwise making
        available defamatory, harassing, abusive, or threatening material or
        language that encourages bodily harm, destruction of property or
        harasses another.
    4.  Forging or misrepresenting message headers, whether in whole or in part,
        to mask the originator of the message.
    5.  Facilitating a Violation of these Terms of Use
    6.  Hacking
    7.  Distribution of Internet viruses, Trojan horses, or other destructive
        activities
    8.  Distributing information regarding the creation of and sending Internet
        viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or
        denial of service attacks. Also, activities that disrupt the use of or
        interfere with the ability of others to effectively use the node or any
        connected network, system, service, or equipment.
    9.  Advertising, transmitting, or otherwise making available any software
        product, product, or service that is designed to violate these Terms of
        Use, which includes the facilitation of the means to spam, initiation of
        pinging, flooding, mail-bombing, denial of service attacks, and piracy
        of software.
    10. Seeking information on passwords or data belonging to another user.
    11. Making unauthorized copies of proprietary software, or offering
        unauthorized copies of proprietary software to others.
    12. Intercepting or examining the content of messages, files or
        communications in transit on a data network.
   
   Close
   Connect
 * PREMIUM & EXECUTIVE
   New Users
   
   Sign Up
   
   --------------------------------------------------------------------------------
   
   Existing Users
   
   
   Forgot password?
   Sign On

PORTOLA HOTEL & SPA • TWO PORTOLA PLAZA MONTEREY, CA 93940
PORTOLA HOTEL & SPA • TWO PORTOLA PLAZA MONTEREY, CA 93940

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Need help? Call Support at (877) 254-4571
Need help? Call (877) 254-4571
Privacy Policy • Terms & Conditions


PRIVACY POLICY

Hotel Internet Services is dedicated to protecting your privacy and safeguarding
your personally identifiable information. Our mission is to consistently exceed
our guests' expectations in terms of the products and services we provide to our
business and leisure travelers. We strive to create an experience that is
responsive to our guests' needs by using the information you entrust us with
responsibly. We respect your privacy and adhere to the principles of applicable
data protection and privacy laws throughout the world.

We have provided this Privacy Statement as an explanation of the information we
collect, how we use it, and how the use of this information can benefit your
experience on our web sites and during your relationship with us. We wish to
help you make informed decisions, so please take a moment to read the sections
below.

We collect information about our guests and visitors to our web site so that we
can provide an experience that is responsive to our guests' and visitors' needs.
Information may be collected as part of: (i) fulfilling reservation or
information requests, (ii) purchasing products, (iii) registering for program
membership, (iv) submitting a job application, or (v) responding to
communications from us (e.g., surveys, promotional offers, or reservation
confirmations). We endeavor to collect information only with your knowledge and
with your permission if necessary. The types of personally identifiable
information that we collect may include your name, home, work and e-mail
addresses, telephone and fax numbers, credit card information, date of birth,
gender, and lifestyle information such as room preferences, leisure activities,
names and ages of children, and other information necessary to fulfill special
requests (e.g., health conditions that require special room accommodations).

We may also collect non-personally identifiable information about you, such as
your use of our web sites, communication preferences, travel habits, aggregated
data relative to your stays, and responses to promotional offers and surveys.

Purpose for Collection, Processing, and Disclosure: Collection & Use
We are fully committed to providing you with information about the collection
and use of personally identifiable information (PII) furnished by, or collected
from, visitors while using our web sites, products and services. It is our
practice not to ask you for information unless we need it or intend to use it.
Some of the primary purposes for collecting your PII are as follows:

providing services such as processing a transaction (e.g., making a reservation,
fulfilling a request for information, or completing a product order) marketing
and communications with you in relation to the products and services offered by
us, our strategic marketing partners, and other trusted third parties performing
market research via surveys to better serve your needs, improve the
effectiveness of our web sites, your hotel experience, our various types of
communications, advertising campaigns, and/or promotional activities.

You will always be offered the choice not to submit your PII or to decide what
communications you want to receive from us. However, doing so may cause certain
transactions to become affected. For example, not providing a name will prevent
the processing of reservations.

Processing and Disclosure
In most cases, the information you provide is added to a local or global
database. In the course of processing your information, it may be necessary to
transfer your PII to trusted third party service providers located in the United
States and throughout the world for the purposes outlined within this Privacy
Statement. As a general practice, we do not sell, rent, or give physical
possession of your PII to unaffiliated third parties. Situations in which we may
disclose your information to others include: when we have received your consent
to do so in situations where sharing or disclosing your information is required
in order to offer you products or services you desire (e.g., a vacation package)
when companies or services providers that perform business activities on our
behalf require such information (e.g., credit card processing, customer support
services, market research administration or database management services) to
comply with legal or regulatory requirements or obligations in accordance with
applicable law or court order in case of emergency such as to safeguard the
life, health, or property of an individual.

If information is shared as mentioned above, we seek to limit the scope of
information that is furnished to the amount necessary for the performance of the
specific function. Unless otherwise precluded by legal process, we require third
parties to protect your PII and abide by applicable privacy laws and
regulations.

Consent
As part of our commitment to keep you informed, we may mail, e-mail, telephone,
or contact you by other means to notify you of new products and services, or
upcoming special offers, events, enhancements, or other relevant information
that may be of interest to you. You may also receive mailings or other
communications from carefully selected third parties. We always offer you the
option to decline any or all of these communications by following the directions
included in our e-mails or other communications, or by contacting us directly.

In some cases your permission will be implied from the nature of the service
requested or transaction undertaken. For example, we may collect and use
personally identifiable information that you volunteer, or behavioral data or
information collected in the aggregate. In addition, your permission will be
deemed given for communications from us that are necessary to fulfill
transactions and services that you request.

Security Safeguards
We recognize the importance of information security, and we are constantly
reviewing and enhancing our technical, physical, and logical security rules and
procedures. Financial transactions to get connected online have security
measures in place to help protect your personally identifiable information
against loss, misuse, and alteration while under our control. Although
"guaranteed security" does not exist either on or off the Internet, we safeguard
your information using both procedural and technical safeguards, including
password controls, "firewalls" and the use of up to 128-bit encryption based on
a Class 3 Digital Certificate. This allows for the use of Secure Sockets Layer
(SSL), an encryption method used to help protect your data from interception and
hacking while in transit.

We may amend this Privacy Statement from time to time in order to meet changes
in the regulatory environment, business needs, or to satisfy the needs of our
guests, properties, strategic marketing partners, and service providers. Updated
versions will be posted to our web site and date stamped so that you are always
aware of when the Privacy Statement was last updated.

Close


TERMS & CONDITIONS

By using our internet service, you hereby expressly acknowledge and agree that
there are significant security, privacy and confidentiality risks inherent in
accessing or transmitting information through the internet, whether the
connection is facilitated through wired or wireless technology. Security issues
include, without limitation, interception of transmissions, loss of data, and
the introduction or viruses and other programs that can corrupt or damage your
computer.

Accordingly, you agree that the owner and/or provider of this network is NOT
liable for any interception or transmissions, computer worms or viruses, loss of
data, file corruption, hacking or damage to your computer or other devices that
result from the transmission or download of information or materials through the
internet service provided.

Use of the wireless network is subject to the general restrictions outlined
below. If abnormal, illegal, or unauthorized behavior is detected, the network
provider reserves the right to permanently disconnect the offending device from
the wireless network.

EXAMPLES OF ILLEGAL USES

The following are representative examples only and do not comprise a
comprehensive list of illegal uses:

 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or
    commercial messages over the Internet using the Service or using the Service
    for activities that invade another's privacy.
 2. Intellectual property right violations - Engaging in any activity that
    infringes or misappropriates the intellectual property rights of others,
    including patents, copyrights, trademarks, service marks, trade secrets, or
    any other proprietary right of any third party.
 3. Accessing illegally or without authorization computers, accounts, equipment
    or networks belonging to another party, or attempting to
    penetrate/circumvent security measures of another system. This includes any
    activity that may be used as a precursor to an attempted system penetration,
    including, but not limited to, port scans, stealth scans, or other
    information gathering activity.
 4. The transfer of technology, software, or other materials in violation of
    applicable export laws and regulations.
 5. Export Control Violations
 6. Using the Service in violation of applicable law and regulation, including,
    but not limited to, advertising, transmitting, or otherwise making available
    ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating
    software, or making fraudulent offers to sell or buy products, items, or
    services.
 7. Uttering threats;
 8. Distribution of pornographic materials to minors;
 9. and Child pornography.

EXAMPLES OF UNACCEPTABLE USES

The following are representative examples only and do not comprise a
comprehensive list of unacceptable uses:

 1.  Obscene or indecent speech or materials
 2.  Defamatory or abusive language
 3.  Using the Service to transmit, post, upload, or otherwise making available
     defamatory, harassing, abusive, or threatening material or language that
     encourages bodily harm, destruction of property or harasses another.
 4.  Forging or misrepresenting message headers, whether in whole or in part, to
     mask the originator of the message.
 5.  Facilitating a Violation of these Terms of Use
 6.  Hacking
 7.  Distribution of Internet viruses, Trojan horses, or other destructive
     activities
 8.  Distributing information regarding the creation of and sending Internet
     viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial
     of service attacks. Also, activities that disrupt the use of or interfere
     with the ability of others to effectively use the node or any connected
     network, system, service, or equipment.
 9.  Advertising, transmitting, or otherwise making available any software
     product, product, or service that is designed to violate these Terms of
     Use, which includes the facilitation of the means to spam, initiation of
     pinging, flooding, mail-bombing, denial of service attacks, and piracy of
     software.
 10. Seeking information on passwords or data belonging to another user.
 11. Making unauthorized copies of proprietary software, or offering
     unauthorized copies of proprietary software to others.
 12. Intercepting or examining the content of messages, files or communications
     in transit on a data network.

Close
© 2024 Hotel Internet Services. All rights reserved.


TERMS & CONDITIONS

By using our internet service, you hereby expressly acknowledge and agree that
there are significant security, privacy and confidentiality risks inherent in
accessing or transmitting information through the internet, whether the
connection is facilitated through wired or wireless technology. Security issues
include, without limitation, interception of transmissions, loss of data, and
the introduction or viruses and other programs that can corrupt or damage your
computer.

Accordingly, you agree that the owner and/or provider of this network is NOT
liable for any interception or transmissions, computer worms or viruses, loss of
data, file corruption, hacking or damage to your computer or other devices that
result from the transmission or download of information or materials through the
internet service provided.

Use of the wireless network is subject to the general restrictions outlined
below. If abnormal, illegal, or unauthorized behavior is detected, the network
provider reserves the right to permanently disconnect the offending device from
the wireless network.

EXAMPLES OF ILLEGAL USES

The following are representative examples only and do not comprise a
comprehensive list of illegal uses:

 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or
    commercial messages over the Internet using the Service or using the Service
    for activities that invade another's privacy.
 2. Intellectual property right violations - Engaging in any activity that
    infringes or misappropriates the intellectual property rights of others,
    including patents, copyrights, trademarks, service marks, trade secrets, or
    any other proprietary right of any third party.
 3. Accessing illegally or without authorization computers, accounts, equipment
    or networks belonging to another party, or attempting to
    penetrate/circumvent security measures of another system. This includes any
    activity that may be used as a precursor to an attempted system penetration,
    including, but not limited to, port scans, stealth scans, or other
    information gathering activity.
 4. The transfer of technology, software, or other materials in violation of
    applicable export laws and regulations.
 5. Export Control Violations
 6. Using the Service in violation of applicable law and regulation, including,
    but not limited to, advertising, transmitting, or otherwise making available
    ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating
    software, or making fraudulent offers to sell or buy products, items, or
    services.
 7. Uttering threats;
 8. Distribution of pornographic materials to minors;
 9. and Child pornography.

EXAMPLES OF UNACCEPTABLE USES

The following are representative examples only and do not comprise a
comprehensive list of unacceptable uses:

 1.  Obscene or indecent speech or materials
 2.  Defamatory or abusive language
 3.  Using the Service to transmit, post, upload, or otherwise making available
     defamatory, harassing, abusive, or threatening material or language that
     encourages bodily harm, destruction of property or harasses another.
 4.  Forging or misrepresenting message headers, whether in whole or in part, to
     mask the originator of the message.
 5.  Facilitating a Violation of these Terms of Use
 6.  Hacking
 7.  Distribution of Internet viruses, Trojan horses, or other destructive
     activities
 8.  Distributing information regarding the creation of and sending Internet
     viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial
     of service attacks. Also, activities that disrupt the use of or interfere
     with the ability of others to effectively use the node or any connected
     network, system, service, or equipment.
 9.  Advertising, transmitting, or otherwise making available any software
     product, product, or service that is designed to violate these Terms of
     Use, which includes the facilitation of the means to spam, initiation of
     pinging, flooding, mail-bombing, denial of service attacks, and piracy of
     software.
 10. Seeking information on passwords or data belonging to another user.
 11. Making unauthorized copies of proprietary software, or offering
     unauthorized copies of proprietary software to others.
 12. Intercepting or examining the content of messages, files or communications
     in transit on a data network.

Close