
How can Web3 organize offline events safely, legally, and in compliance with regulations?
TechFlow Selected TechFlow Selected

How can Web3 organize offline events safely, legally, and in compliance with regulations?
For organizers, the optimal path has always been "controlling maximum risk at minimum cost."
By Manqin
In Web3, hosting events has become a standard practice for nearly every project team. Want exposure? Want partnerships? Organizing or participating in events is undoubtedly one of the best ways to achieve both.
Did you attend the recent Web3 Festival held in Hong Kong? Beyond the main summit, the surrounding activities were incredibly diverse—ranging from cocktail parties and afterparties to technical salons, meetups, closed-door sessions, hackathons, and forums. You could say that Hong Kong’s entire month of April was saturated with Web3 activity.
Yet many organizers assume that hosting an event is simple: just plan an agenda, invite some guests, secure a venue or platform, and launch a promotion campaign. Easy, right?
In reality, there are numerous compliance considerations involved—especially in Web3, an industry characterized by financial attributes, technological innovation, and cross-border operations. The regulatory risks associated with offline events here far exceed those of traditional industries, and overlooking compliance is a serious mistake.
Therefore, in this article, lawyer Manqin takes the perspective of event organizers and combines real-world logic with practical insights to systematically outline common legal issues in Web3 events and offer pragmatic strategies. This guide aims to help project teams and operations staff truly "run compliant events."
The Three-Step Compliance Framework for Event Hosting
Web3 events are sensitive not merely because they involve “crypto,” but because they operate across multiple gray zones—spanning industries, jurisdictions, and user identities.
Accordingly, what organizers should really be asking themselves is: Across planning, execution, and post-event stages, have I exercised due diligence—anticipating and controlling all potential risks upfront?
Step 1: Planning Stage
What kind of event are you organizing? This is the first step in any compliance assessment.
Many Web3 organizers limit their thinking during planning to surface-level labels like “technical sharing” or “community gathering.” But from a regulatory standpoint, what matters most is the substance and intent behind your event:
Are you promoting a token? Are you facilitating fundraising? Are you enabling foreign platforms to conduct business within restricted territories?
These factors determine your event's actual compliance risk level—not the name you give it.
Based on professional experience and judgment, Manqin categorizes offline Web3 events into three tiers based on their substantive content:
Low-Risk Events
Examples include purely technical hackathons (e.g., ETHGlobal), developer workshops, and private technical exchanges. These focus on code and product development, avoid fundraising, and do not promote tokens—thus posing relatively low risk. However, caution is still advised: avoid using tokens as prize rewards or linking outcomes directly to tokenized projects, which may raise suspicions of “disguised token issuance.”
Medium-Risk Events
This category includes industry summits, product launches, project meetups, and cocktail receptions—events with promotional or market-preparation purposes. While seemingly social in nature, if speakers mention specific tokens, media coverage becomes excessive, or participant profiles are complex, such events can easily be perceived as indirect marketing. Organizers should therefore carefully vet attendees and especially speakers; it's also advisable to avoid having crypto KOLs as hosts to prevent forming a “token association chain.”
High-Risk Events
These typically involve investment, financing, or token promotion—for example, private investor matchmaking sessions, exclusive gatherings with investors, or token roadshows. If such events target mainland Chinese investors, they risk violating prohibitions against illegal securities offerings or unauthorized fundraising. To mitigate these risks, organizers can set access restrictions (e.g., limited to overseas licensed institutions, no token discussion), ensure materials are distributed only outside China, refrain from discussing “price expectations” or “investment returns,” and maintain comprehensive compliance documentation throughout.
Some organizers might think: “My event is in Hong Kong—how could there be a problem?” But note: if your content reaches or targets users in mainland China, even hosting the event offshore may still lead regulators to conclude you’re “providing services to domestic residents.”
Hence, an event’s risk isn’t determined solely by its location or title, but by what is said, who hears it, and whether funds move.
Additionally, when involving foreign nationals, minors, or individuals with specific professional backgrounds (e.g., financial professionals), certain jurisdictions require prior registration or special permits. Ignoring these requirements—even if the event itself involves no illegal acts—could result in inquiries or penalties due to inadequate identity verification.
During the planning phase, Manqin recommends three essential actions:
1) Classify the event based on its actual content and objectives;
2) Define the event’s reach—particularly whether it involves users from mainland China, sensitive countries/regions, or cross-border promotion;
3) Establish clear “compliance boundaries” in advance: what topics won’t be discussed, what materials won’t be shared, and who won’t be invited.
Remember: You're not just designing an event schedule—you're crafting a narrative of compliant behavior. Misclassify at this stage, and everything downstream, no matter how cautious, could still be wrong.
Step 2: Execution Stage
The plan is set. Now comes the real challenge: implementation. Yet it's precisely at this stage that small oversights often trigger major compliance issues.
Anyone who's organized events knows that planning and execution are two very different things. Many problems aren't intentional—they emerge unintentionally during execution, accidentally crossing red lines.
Manqin identifies three critical areas where compliance risks commonly arise during event execution:
(1) Does promotional content cross the line?
Organizers often use inappropriate language in promotional materials, slides, or press releases. Be particularly cautious of these high-risk phrases:
-
"Upcoming launch / token issuance / listing"
-
"Airdrop," "early purchase," "X-fold potential token"
-
"Led by XX investment firm," "endorsed by renowned VC"
-
Price predictions, return projections, or investment yield descriptions
The use of such expressions may lead regulators to认定 (identify) them as indications of “token sale promotion” or “public fundraising”—activities that may constitute illegal financial operations.
Therefore, establish a standardized compliance review process for all promotional materials. Ideally, involve legal counsel to review every public-facing item—including posters, tweets, event brochures, and speaker presentations—to identify information that may be acceptable in private but must never be disclosed publicly.
(2) Do on-site speeches pose risks?
In forums or meetups, guest speakers’ remarks are often unpredictable. However, as the organizer, you may still bear responsibility for their content.
In practice, regulators don’t only look at whether the organizer personally promoted something. As long as you organized the event or provided the platform, you may be held accountable for unreviewed content—even if it came from a speaker’s spontaneous disclosure, a token roadmap in a slide, or subtle hints about trading opportunities during an interview. Failure to exercise editorial oversight may expose you to joint liability.
Another common “hidden compliance bomb” is indirect support for foreign platforms or services. For instance, allowing representatives from overseas platforms to speak, displaying QR codes for registration, or embedding demos of foreign tech products. Even without directly handling tokens or offering trading access, facilitating such activities may be seen as assisting unlicensed financial services in operating domestically—potentially constituting complicity in illegal financial activities.
Thus, organizers must pre-review all speaking content and provide clear guidelines to speakers onsite. When discussing tokens, platforms, or projects, avoid implying investment opportunities, explaining trading mechanisms, or suggesting price trends. Maintain active control over the session to minimize risks.
(3) Are there loopholes in funding and venue arrangements?
Don’t underestimate the compliance sensitivity around ticket sales and sponsorships. Accepting payments or sponsorships in cryptocurrency varies widely in legality across jurisdictions. For example, in strictly regulated regions like mainland China, authorities have repeatedly emphasized that virtual currencies must not be used as payment methods. Charging admission via USDT or other tokens may be deemed providing unauthorized virtual currency payment services—and thus classified as an illegal financial activity.
Even in more open jurisdictions like Hong Kong or Dubai, accepting sponsorship from unlicensed overseas exchanges or crypto investment firms poses risks. If the event features project promotions or brand visibility for such entities, organizers may be viewed as assisting unlicensed virtual asset service providers in conducting business—especially when combined with promotional content.
Venue selection also carries compliance implications: Is the venue legally permitted? Is it open to the public? Does it require temporary registration? Is the expected attendance within legal limits? Are there foreign attendees or representatives from sensitive countries? Many organizers overlook these details during early planning, yet in certain jurisdictions—including mainland China—violations could lead to the event being labeled an “illegal assembly” or “offshore operation.” In places like Hong Kong, ensure the venue is zoned for commercial use and inform landlords or management clearly about the event nature to avoid disputes arising from its association with the crypto industry.
Beyond these three areas, data and media usage are emerging as new high-risk zones. Common practices such as full-session audio/video recording, collecting attendee personal information, or live-streaming on social media can infringe upon participants’ image rights and privacy if proper consent isn’t obtained or usage isn’t disclosed. In cross-border data transfer scenarios, these actions may also breach data protection regulations.
Step 3: Post-Event Review Stage
Is everything fine once the event ends? Not necessarily, says Manqin.
In actual enforcement cases, many projects face consequences not because of issues during the event, but due to digital “traces” left afterward. Social media posts, archived data, and sponsorship fund flows—if mishandled—can become entry points for later investigations.
Thus, Manqin emphasizes: A complete compliance cycle must include post-event management.
(1) Are “compliance records” preserved?
After the event, organizers should compile and retain the following key documents to prepare for possible regulatory inquiries:
-
Speaker scripts, final PPTs, or presentation summaries;
-
On-site video/audio recordings (if applicable);
-
Final versions of promotional materials and lists of distribution channels;
-
Basic attendee registration data (if collected);
-
Contracts related to venue rental and sponsorships;
-
Detailed financial statements, especially records explaining any transactions involving crypto assets.
These materials aren’t meant for proactive filing, but they serve as crucial evidence to demonstrate your intent to comply and prove that reasonable oversight was exercised.
(2) Is there a “speech traceability” mechanism?
If token-related content was presented during the event, organizers need a system to trace back who said what. Especially for unsolicited speaker comments, consider requiring speakers to sign disclaimers or risk notices beforehand, clarifying that they bear legal responsibility for their own statements—avoiding situations where “a speaker goes too far, and the organizer takes the fall.”
Also, decide in advance whether recorded content will be published: Which parts can go public? Which should remain internal? If content includes token information, assess the legal implications of its dissemination to specific audiences (e.g., users in mainland China).
(3) Is there a “post-event public relations response plan”?
Web3 events often generate high visibility and community discussion. An event intended as “internal exchange” might go viral due to a single comment from a KOL.
In such cases, organizers should have basic response protocols ready:
-
Are you actively monitoring post-event discussions and media coverage?
-
If misleading or risky statements appear, can you quickly clarify or remove them?
-
Can you issue unified communications within the community to define the event’s compliant boundaries?
If misinformation spreads unchecked—such as claims that the organizer “publicly promoted a project” or “marketed tokens in mainland China”—even a well-designed compliant event may end up violating rules through secondary dissemination.
From a compliance standpoint, the “wrap-up” phase determines whether the risk management loop is truly closed.
Manqin’s Summary
Organizing a Web3 event is never just about scheduling and inviting guests.
Truly safe offline events don’t rely on luck or “not getting caught”—they embed compliance into every stage from the outset. The earlier you integrate compliance, the more control you gain, and the more confidently you can move forward.
In today’s increasingly stringent global regulatory environment, every Web3 offline event sends signals to the outside world. Organizers and the events themselves naturally become focal points for risk exposure. What you see as just a cocktail party or casual meetup might be interpreted by regulators as marketing, fundraising, or unauthorized business expansion.
For organizers, the optimal strategy has always been to “minimize maximum risks at minimal cost.”
Looking ahead, Web3 events will only grow more diverse—while institutional frameworks behind them are already taking shape.
Join TechFlow official community to stay tuned
Telegram:https://t.me/TechFlowDaily
X (Twitter):https://x.com/TechFlowPost
X (Twitter) EN:https://x.com/BlockFlow_News













