Mechanisms exist to restrict the ability of non-privileged users to install unauthorized software.
Does the organization restrict the ability of non-privileged users to install unauthorized software?