You won’t get into trouble doing that, will you? I’m just thinking if, heavens forbid, you suffer a data breach at work, and the network admins start going through the logs with a fine tooth-comb, you’re won’t get hauled over the coals, will you, as a possible suspect for the point of entry?
From the excellent SSH Mastery by Michael W Lucas:
"As a user, the ability to tunnel arbitrary traffic over SSH does not mean you should. If your organization's security policy forbids port forwarding or tunneling, don't do it. If the policy says "use the Web proxy and stay off IRC," then listen. I am not responsible if you use these techniques and are reprimanded, terminated, or exterminated. (Even if we IT security officers are all petty tinpot despots who don't understand your very personaland deeply urgent need for IRCand Google+.)"