Cookie Policy

Information from Cookies & Other Technologies: A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Pixel tags (also called web beacons) are small blocks of code placed on websites and e-mails. StylishCircle uses cookies and other technologies like pixel tags to help us identify and track visitors, usage, and access preferences for our Services to deliver targeted ads. 


Additional information on Cookies: the internet pages partly use so-called cookies. Cookies do not harm your computer and do not contain viruses. Cookies serve to make our offer more user-friendly, effective and secure. Cookies are small text files that are stored on your computer and stored by your browser.

Most of the cookies we use are so-called “session cookies”. They are automatically deleted after your visit. Other cookies remain stored on your device until you delete them. These cookies allow us to recognize your browser the next time you visit.

You can set your browser so that you are informed about the setting of cookies and allow cookies only in individual cases, the acceptance of cookies for certain cases or generally exclude and enable the automatic deletion of cookies when closing the browser. Disabling cookies may limit the functionality of this website.

Access data / server log files: We (or our web space / hosting provider) collects data about every access to the website (so-called server log files). Access data includes:

Name of the retrieved web page, file, date and time of retrieval, amount of data transferred, message about successful retrieval, browser type and version, the operating system of the user, the previously visited page, IP address and the requesting provider.

We and the web space provider use the log data only for statistical evaluations for the purpose of operation, security and optimization of the website. However, the provider reserves the right to subsequently review the log data if, on the basis of concrete evidence, the legitimate suspicion of unlawful use exists.