I agree with serfty here.
Where I work ((worked) & JohnK knows where that is) adding or removing software without approval is a the second most common sacking offence. (Inappropriate us of Corporate Amex is first) It is all included (here we go again) in the T & C that must be signed prior to getting PC access let alone internet access which requires higher levels of approval.
Whether you like it or not it is an accept or leave situation :!:
If I may draw a page out of one of the other threads floating around:
- Your signing a T&Cs employment contract only binds you to conditions which are not otherwise in contravention of your statutory rights under the relevant laws
- The consequences arising from a breach of the T&Cs are subject to reasonableness tests under the guise of the relevant laws
:mrgreen:.......
Complicated world we live in, isn't it? Let's not even mention getting the union involved......
FWIW it was only about over a month ago that I was granted
local administrator rights on my machine - one of the biggest things this allowed me to do was have more control over installed applications (and since I came to my research centre I've had to ask IT support for several requests to install other apps and drivers); however, there are still some tasks I cannot do (for example, I can't change how I run Windows updates - appears to be group policy). I think it is mainly though because I have been here for a while (three years at least, although at one point only on-and-off) and the long-time IT support techie knows that I can handle a computer aptly, but obviously there's a high degree of trust there necessary.
Thankfully, the standard install images on our systems do not contain much annoy-ware, so uninstallations have been unnecessary!
In comparison, when I worked at an engineering consultancy, everyone logged on as an administrator and had according rights to the entire network - in fact, to every computer on it as well! (You easily had people transferring data between office machines without fuss, cf. now where we only transfer data between machines using USB drives or by using our common network drive).
Another comparison is when I worked on contract briefly for a mining company. The company issued laptop I was given was of course protected as per the usual (and as everyone else has relayed here).