For the organizers, the optimal path has always been "to control the maximum risk at the minimum cost."
Written by: Mankun
In Web3, "holding events" has almost become a standard action for every project team. Do you want exposure? Do you want collaboration? Organizing and participating in events is definitely one of the best ways to address these two issues.
I wonder if anyone attended the recent Web3 Festival held in Hong Kong. In addition to the large main summit, the surrounding events were diverse, ranging from cocktail parties, afterparties, technical salons, to meetups, closed-door meetings, hackathons, and forums. One could say that the entire month of April in Hong Kong was heavily infused with Web3.
However, many organizers may feel that organizing an event is simply about planning a process, inviting guests, finding a venue or platform, and doing some promotion—very simple!
In reality, organizing an event involves many compliance matters, especially since Web3 is an industry that possesses financial attributes, technical characteristics, and cross-border features. The compliance risks of offline events are far higher than those in ordinary industries, and ignoring these compliance issues is often a major taboo.
Therefore, in this article, Mankun, a lawyer, will systematically outline common legal matters in Web3 events and practical response strategies from the perspective of event organizers, helping project teams and operations to truly "organize events legally and compliantly."
Three Steps of Compliance Logic for Organizing Events
The sensitivity of Web3 events is not just because they have the shadow of "tokens," but because they involve too many gray areas across industries, regions, and identities.
Thus, the real question that event organizers should consider is: in the three stages of event planning, execution, and follow-up, have I fulfilled my "due diligence" and anticipated and controlled all potential risks?
Step 1: Event Planning Stage
What kind of event do you want to hold? This is the first step in all compliance judgments.
Many Web3 organizers often only focus on superficial labels like "technical sharing" or "community gathering" when planning events. However, from a regulatory perspective, what truly matters is the substantive content and purpose of your event—
Are you promoting a token? Are you organizing financing? Are you facilitating the operations of an overseas platform within the country?
These factors determine the compliance risk level of your event, rather than the name you use to package it.
Here, based on personal experience and judgment, Mankun categorizes Web3 offline events into three risk levels based on substantive content:
Low-Risk Activities
For example, purely technical-oriented hackathons (like ETHGlobal), R&D workshops, and closed-door developer exchanges. These activities focus on code and products, do not involve financing or token promotion, and have relatively low overall risk. However, care should be taken to avoid using tokens for prizes or connecting results to token projects to prevent doubts about "using technology to package token issuance."
Medium-Risk Activities
Typically, activities such as industry summits, press conferences, project meetups, and cocktail parties that have a "promotion" or "market warming" nature. They may seem like light social events, but if guest speeches involve project tokens, media follow-ups are too heated, or participants have complex identities, they can easily be questioned as "disguised marketing." Therefore, organizers need to carefully select attendees, especially speakers; it is also best not to arrange for crypto KOLs to host, to avoid forming a "token association chain."
High-Risk Activities
These are generally related to investment financing or tokens, such as closed-door financing meetings, private investor meetups, and token roadshows. Once these scenarios target investors from mainland China, they can easily cross the red lines of illegal securities issuance or illegal fundraising. To reduce such risks, entry barriers can be set in advance (e.g., limiting to licensed foreign institutions/not involving tokens), materials can be directed only to overseas audiences, and the entire process should avoid discussing "price expectations" or "investment returns," while keeping compliance backup records.
Many organizers might think, "My event is in Hong Kong, how could there be a problem?" But please note: if your content or dissemination reaches users in mainland China, even if the venue is overseas, it may still be regarded by regulators as "providing services to domestic residents."
Therefore, the risk of an event does not only depend on where it is held or what it is called, but rather on what is said, who is listening, and whether there is any flow of funds.
Additionally, when involving foreign personnel, minors, or specific professional identities (such as financial practitioners), laws and regulations in some regions may require event filing or specific permits. Ignoring these requirements, even if the event itself is not illegal, may lead to inquiries or actions due to inadequate identity verification.
Thus, when planning an event, Mankun suggests that there are three things that must be done:
1) Substantively classify the type of event based on actual content and objectives;
2) Confirm the boundaries of the event's reach, especially whether it involves users in mainland China, sensitive countries or regions, or cross-border promotion;
3) Set a "content compliance line" in advance, specifying what should not be said, what materials should not be distributed, and who should not be invited.
Remember: you are not planning an event process; you are crafting a narrative of compliant behavior. Misclassifying can lead to mistakes later, no matter how careful you are.
Step 2: Event Execution Stage
Once the process is set, it enters the stage of "actual execution." However, it is precisely at this stage that compliance issues are most easily triggered due to overlooked details.
Anyone who has organized an event knows that planning is one thing, and execution is another. In reality, many issues arise not from intentional planning but from "accidentally crossing the red line" during execution.
Mankun summarizes the key issues in the event execution stage into three aspects:
(1) Does the promotional content cross the line?
Many organizers, when designing event materials, creating PPTs, or publishing promotional articles, can easily mislead due to inappropriate wording, especially the following high-frequency "risk phrases" that require special attention:
"Coming soon / Token issuance / Listing"
"Airdrop," "Early subscription," "X times potential token"
"XX investment institution leading the investment," "Famous VC endorsing"
Token price predictions, return expectations, investment return descriptions
Once these expressions appear, they may be deemed by regulators as having tendencies toward "token sales promotion" or "public fundraising" and other illegal financial activities.
Therefore, it is recommended to establish a unified compliance review mechanism for promotional materials. It is best to have legal counsel or a lawyer assist in reviewing and pre-evaluating all external posters, tweets, event manuals, guest PPTs, etc., to clarify which information is "only to be discussed privately, not publicly."
(2) Is there a risk in on-site speeches?
In forums or meetup events, the content of guest speeches is often uncontrollable. However, please note that as long as the event is organized by the organizer, the content responsibility may "fall back on you."
In practice, regulatory agencies often do not only look at whether the organizer "personally promotes." As long as you are the event organizer or hosting platform, whether a guest "leaks" information on-site, a PPT presents a token roadmap, or an interview hints at token trading opportunities, regulators may determine that you have not fulfilled your content review obligations, thus bearing joint risks.
Another typical "compliance hidden danger" is indirect support for foreign platforms or services. For example, if a project arranges a platform representative to speak at the event, provides QR codes for registration, or embeds technical product demonstrations. Although the organizer does not directly involve tokens or provide trading access, due to "facilitating the operations of foreign platforms within the country," it may ultimately be classified as assisting illegal financial activities.
Therefore, event organizers must review the content of guest speeches in advance and remind speakers on-site, especially regarding shares involving tokens, platforms, or projects, to avoid guiding investments, displaying trading logic, or hinting at price trends. At the same time, efforts should be made to control the venue during speeches.
(3) Are there loopholes in the funding and venue aspects?
Do not underestimate the compliance sensitivity behind "charging admission" or "accepting sponsorship." Collecting admission fees in cryptocurrency or accepting token sponsorships varies greatly in compliance across different regions. For example, in strictly regulated areas like mainland China, regulatory agencies have repeatedly emphasized that virtual currencies cannot be used as payment tools. If an event charges fees through tokens like USDT, it may be seen as providing virtual currency payment services, thus being classified as "illegal financial activities."
Even in relatively open regions like Hong Kong and Dubai, if the sponsor is an unlicensed foreign trading platform or sensitive entities like crypto investment institutions, the event organizer may also be seen as "assisting unlicensed virtual asset service providers," especially when the event content includes project promotion or brand exposure, increasing the risk.
At the same time, the choice of event venue also has compliance standards, such as whether the venue is legal, whether it is open to the public, whether temporary filing is required, whether it exceeds the maximum number of attendees, and whether there are foreign participants or representatives from sensitive countries. Many organizers may not consider these issues clearly in the initial planning, but in certain jurisdictions, such as mainland China, crossing the line may directly be classified as "illegal assembly" or "foreign operations." In places like Hong Kong, attention should also be paid to using commercial venues and clearly communicating the event content to owners or management agencies to avoid venue disputes arising from "crypto" attributes.
In addition to the three aspects mentioned above, the use of data and images is becoming a new high-risk compliance area. Common practices during events, such as full audio and video recording, collecting participant information, and live streaming on social media, may infringe on participants' portrait rights and privacy rights if proper authorization is not obtained or purposes are not disclosed, and may even trigger compliance red lines in cross-border data flow scenarios.
Step 3: Event Review Stage
Once the event is over, is everything "all good"? Mankun believes: not necessarily.
In actual law enforcement, many projects are not held accountable because of issues at the event site, but rather due to the "traces" left after the event. Especially in areas like social media records, data archiving, and the flow of sponsorship funds, if not handled properly, they can easily become a breakthrough point for subsequent investigations.
Therefore, Mankun reminds us: a truly complete compliance loop must include post-event review management.
(1) Are there "compliance records" left?
After the event, project teams must organize and retain the following key materials to respond to potential investigations or inquiries:
Guest speeches, PPTs, or versions of speech summaries;
On-site video/audio materials (if recorded);
Final versions of promotional materials and lists of distribution channels;
Basic registration of participants' information (if there is a registration process);
Venue rental, sponsorship agreements, and other contractual documents;
Detailed income and expenditure records of the event, especially explanations regarding tokens.
These materials are not for "proactive filing," but can help the project demonstrate compliance intentions and that the organizer has fulfilled reasonable review obligations in the event of future compliance inquiries.
(2) Is there a "speech traceability" mechanism?
If token-related content appears during the event, the organizer needs to establish a speech traceability mechanism, clarifying who provided which content and whether the statements were reviewed.
Especially for guest speeches, it is recommended to clarify the legal responsibility for their statements by signing a responsibility statement or risk reminder letter before the event, to avoid situations where "guests overstep, and the organizer takes the blame."
Additionally, whether the recorded content will be made public should also be planned in advance: which content can be disseminated in the public domain, and which is for internal archiving only. If the content involves token information, the potential legal implications of disseminating it to specific groups (such as mainland users) should be assessed.
(3) Is there a "post-event public opinion handling plan"?
Web3 events are often accompanied by high exposure and community fermentation. An event originally intended for "internal communication" can suddenly trend on social media due to a single statement from a KOL.
In such scenarios, organizers should have basic response plans in place:
Are they monitoring the dissemination of content related to the event in a timely manner?
If misleading statements or risky comments arise, can they quickly clarify and remove them?
Can they unify their voice within the community to explain the compliance boundaries of the event?
If the dissemination is left unchecked, leading to distorted descriptions such as "the organizer publicly promotes the project" or "domestic promotion of tokens," then even if the event itself is designed to be compliant, it may still run into issues during "secondary dissemination."
Therefore, from a compliance perspective, the "wrap-up" phase of the event review also determines whether the risk closure of the event is truly completed.
Summary by Lawyer Mankun
Organizing a Web3 event is never just about process arrangements and guest invitations.
A truly safe offline event relies not on "not having issues," but on integrating legal compliance into every aspect from the very beginning. The earlier compliance is involved, the more proactive the organizers can be, and the more confidently they can "go out."
In the context of increasingly tightening global regulations, every offline event in Web3 is essentially a signal released by the project to the outside world, and the organizers and the event itself naturally become windows for bearing risks. What you may think is just hosting a cocktail party or organizing a meetup could be seen by regulators as marketing, fundraising, or business expansion.
Therefore, for organizers, the optimal path has always been "to control the maximum risk at the minimum cost."
It is foreseeable that Web3 events will become increasingly diverse, and the institutional construction behind these events has already begun.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。