I'd imagine;
There's a group policy setting for that 
.
There are GPO settings for bitlocker, the point is how many organizations that aren't already using bitlocker have them specifically set to disabled instead of "not configured" considering they aren't using the feature and it's never been an issue. Yeah, it boils down to IT staff doing their due diligence before pushing out major updates so they understand exactly how they affect their environment, but this is a pretty big issue that would be very easy to slip through the cracks for smaller businesses that wont be caught until someone has lost data because of it.
Likewise, GPO doesn't help home users much. When John Smith installs crapware on his laptop that ruins his windows install and takes it to Best Buy to get fixed, they're gonna tell him "your drives encrypted, we can reinstall windows but it's gonna wipe all your data."
Hopefully it's as simple as slaving the drive to another good PC and having the users admin-enabled password to decrypt via a Microsoft provided software tool like it is with pretty much all enterprise-grade full disk encryption, but my worry is that since bitlocker is directly tied into the OS that the very issue of not being able to boot into the OS could make the data unrecoverable.
Has anyone actually had experience recovering data from a bitlocker encrypted drive? Is there any reliable documentation out there on the subject that might help explain why this is a good idea?