That would make it centrally managed. Unless the user can override this configuration, we're talking about remote administration. Either through this tool, or through some other tool that deploys it and ensures the user cannot change it.
Kudos to the developer for standing their ground, but if we're talking about a remotely managed client computer then I don't think there's much the user can do to protect their privacy.