Terms of Service
Beddow Capital Management (“BCM”) is a full-service investment advisory firm — a team of investment professionals whose goal is to work with clients to achieve their investment and retirement goals. The BCM website provides a venue for both visitors and existing clients to access news and information about BCM. Visitors to this website acknowledge that the information contained herein does not provide a warranty or necessarily imply the suitability of BCM’s services for their investment needs. Such suitability or merchantability of such services can only be determined through direct contact with authorized employees of BCM.
This website is owned and operated by BCM. No materials from this website may be reproduced, republished, posted, or distributed in any way, without the prior permission of BCM. You may download or print material displayed on this website for your use only. BCM does not warrant or represent that your use of materials displayed on this website will not infringe upon the rights of third parties. Those who choose to access this website do so on their own initiative.
BCM and any logos, service marks, page headers, button icons, and scripts contained in this website are trademarks or trade dress of BCM . BCM’s name, trademarks or trade dress may not be used without the prior permission of BCM. All other trademarks, icons, and links that appear on this site are the property of their respective owners.
This website may contain links to other websites which are not maintained by BCM . BCM is not responsible for the content of those websites. The inclusion of any link to such websites does not imply approval or endorsement by BCM of the websites or the information contained within.
You may not use any device, software, or routine, including but not limited to any viruses, trojan horses, or worms, intended to damage or interfere with the proper working of the BCM website. You may not take any action which imposes an unreasonable or disproportionately large load on our website, including but not limited to denial of service attacks, “spam:”, or any other unsolicited overload technique.