Using Private Browsing mode while connected to organization's network
As others say - Private Browsing is a protection for your workstation/laptop - great if you want to clean it because it's used publicly. Not great for eluding your network admins.
The company you work for does have the right to set a policy for how it's resources are used, and monitor that employees stick within the policy. The analogy of a phone system is apt - you've reset your "phone", you haven't erased your phone bill which shows every number you called.
Depending on configuration, your company can see what IP addresses you visited, what URLs you requested, the traffic sent between the sites and you, content transmitted between the sites and you, and get a rough sense of for how long you were visiting the sites. The sites you visit do represent a security risk, and the company has a right to monitor and protect itself from that risk.
Practically speaking, it's rare for a company to scrutinize employee by employee. Collecting the data, sorting it for each employee, and going through it in details is just way more work than a company of any size wants to consider. In a big company, it's like finding a needle in a haystack, in small companies, the one guy who can do this is just too busy.
Generally, you have to do some or all of the following for this to come into play:
- do very poorly in job performance - to the point where they wonder what you are doing, because it clearly isn't work...
- have a major security issue - if you get hacked or get a virus, they will fix it, research why it happened and try to prevent it in the future. That extra scrutiny can bring on questions of why you were on a social site if the company policy prohibits it.
- visit sites excessively, and compromise availability of resources - if you are streaming Hulu, Netflix, YouTube, etc for the entire work day, you are limiting bandwidth for legitimate use. When the executive says "why is this so slow?", you don't want to be the reason.
In all honesty, I find the best answer to be - if you want your behavior to stay private, don't do it at work. The computer for work was given to you for work. Generally some polite social browsing in limited scope is not against the rules, if it doesn't impact your work... but the point of the computer they gave you wasn't for your personal enjoyment. If your privacy is important, do it at home, or pack a personal device with net access - it's getting easier and easier with smart phones and tablets to get off the company network entirely.
Your network administrator can see to which sites you connect. Using private browsing mode to wipe or simply not store information on your PC does not change the way in which you connect to these sites, nor does it prevent anyone from seeing these connections.
It might be easier of you think of it as a phone. You call someone. Those calls are routed though the phone system of your firm. Afterwards you reset your phone to to factory settings. That will wipe evidence of that call from the phone, not not from the telephone system.
Having said all that: You network administrator probably is not allowed to spy on you.
Rules differ per country, but generally there needs to be a clear reason before anyone (network administrator or anyone else) is allowed to spy on you. An unusual slow network connection caused by streaming music or watching HD youtube movies over a 2mbit line is a good reason to check what the line is being used for.
Yes they would.
Private Browsing Mode (in most browsers) is designed to make the browser avoid saving the history of visited URLs on your computer. Your network administrator can still view the logs of the Internet gateway via which you connection to the Internet. Even if you're using HTTPS, your network administrator can still know the IP addresses to which you're connecting, and thus knowing, with very high accuracy, the websites you're visiting.
Your best option is to setup an SSH or VPN server on your home computer and then tunnel from work to your computer, making your traffic encrypted between your work computer and your home computer. Even then, it's likely that your company is performing corporate MiTM attacks in which they deploy certificates in your trusted root CA store in your computer via Group Policy and then stand between you and the SSL server to which you're trying to connect.