Violation Type:Transparent Proxying
An ISP uses a transparent proxy to cache HTTP requests.
This involves intercepting Layer 4 TCP traffic on port 80 and rerouting it through a transparent HTTP proxy operated by the ISP.
This involves processing layer 4 data (which is beyond the remit of an ISP); intercepting communications and impersonating the remote party.
This is a violation of network neutrality and thus constitutes a violation.