First off they are not fake certs, they are they are just issued by the companies internal certificate authority.
Your corporate laptop does not belong to you. It was given to you to do the work the company pays you for not for your personal banking or anything else. It isn't the least bit unreasonable for them to configure it how they choose with whatever certificate trusts they want. Again its not your computer you can decide if you trust it/them with your personal stuff or not.
Additionally I can tell you outbound SSL interception is NECESSARY on corporate networks. In todays world of botnets and hacks you cannot claim to be doing due diligence to protect the company's trade secrets, financial data, IP assets, and all the PII of employees corporations handle if you just let everything go out the door in an opaque way like well a firewall rule that says "hey 443 outbound anything goes". Seriously if you still think this is an okay policy and a medium or large business and you have Security responsibilities, you should be fired.
Contrary to what you may think your IT Security department has better things to do than spy on your facebook likes and drug prescriptions. They don't care and in most cases actively don't want to know. What they do want is to make sure your traffic gets a pass over their IDS signatures, custom rules to grab anything with internal document numbers, botnet detection algorithms, etc. They also want to track statistically unusual large outbound transfers and log that they occurred so there is some evidence and some kind of history of events can get put together after the fact if something does happen. They probably log request headers etc for the same reason, but I doubt very much anyone looks at them, except when a need for forensic investigation arises.
I can tell, we never spied on our co-workers when I was managing system similar to bluecoat. We only tested capabilities within our group (with full knowledge) to make sure things worked. We were open about the fact they we inspected outbound traffic with the organization. Any employee who opened the handbook or read the first paragraph of our acceptable use policy they had to sign as part of their hiring documents knew we had these capabilities.