pretty harsh there Santa. Makes sense though.
Look at it this way. company's computer, network, data, storage, server, circuits, EVERYTHING.
So let's say you use their postage service to mail out flyers advertising you want to sell/buy something. that's wrong right? You would probably get fired for that right?
same with going to e-bay on said company's property, using their resources, on time you are paid for. work is work, play is play.
An another thing, about using anomizer. It is not anonomous unless you're using SSL or other kinds of encryption to such anonomizer services. Otherwise I know where you are going and what you are doing. Use a proxy? I still know exactly where you go and what you do unless encrypted.
Look at a trace of a proxy sessions. HTTP headers are the same (contain full path and command), just dst address changed.
-edit- end lecture, you know the consequences. proxy over a non-standard port with encryption to an outside host if you must. You may be smarter than the folks in charge of security/HR (and don't think they aren't extremely related). then again you may not be. Drag - Most professional logging programs can decode VNC just fine and tell exactly what you are doing.