By Categories: Polity

Background

The Supreme Court of India has sought the most recent position of the Union government on a batch of petitions challenging the Constitution (Scheduled Castes) Order of 1950, which allows only members of Hindu, Sikh and Buddhist religions to be recognised as SCs.

Who all are included in the Constitution Order of 1950?

  1. When enacted, the Constitution (Scheduled Castes) Order of 1950, initially provided for recognising only Hindus as SCs, to address the social disability arising out of the practice of untouchability.
  2. The Order was amended in 1956 to include Dalits who had converted to Sikhism and once more in 1990 to include Dalits who had converted to Buddhism.
  3. Both amendments were aided by the reports of the Kaka Kalelkar Commission in 1955 and the High Powered Panel (HPP) on Minorities, Scheduled Castes and Scheduled Tribes in 1983 respectively.
  4. On the other hand, the Union government in 2019 rejected the possibility of including Dalit Christians as members of SCs, rooting the exclusion on an Imperial Order of 1936 of the then colonial government, which had first classified a list of the Depressed Classes and specifically excluded “Indian Christians” from it.

Why are Dalit Christians excluded?

  • Responding to the Ministry of Home Affairs’s (MHA) 1978 request for an opinion on the inclusion of Dalit Buddhists and Christians, the RGI had cautioned the government that SC status is meant for communities suffering from social disabilities arising out of the practice of untouchability, which it noted was prevalent in Hindu and Sikh communities.
  • It also noted that such a move would significantly swell the population of SCs across the country. However, the amendment to include Buddhist converts as SCs was passed in 1990.
  • In 2001, when the RGI again opined against including Dalit Christians and Muslims as SCs, it referred to its 1978 note and added that like Dalit Buddhists, Dalits who converted to Islam or Christianity belonged to different sets of caste groups and not just one, as a result of which they cannot be categorised as a “single ethnic group”, which is required by Clause (2) of Article 341 for inclusion.
  • Moreover, the RGI opined that since the practice of “untouchability” was a feature of Hindu religion and its branches, allowing the inclusion of Dalit Muslims and Dalit Christians as SCs could result in being “misunderstood internationally” as India trying to “impose its caste system” upon Christians and Muslims.
  • The 2001 note also stated that Christians and Muslims of Dalit origin had lost their caste identity by way of their conversion and that in their new religious community, the practice of untouchability is not prevalent.

Is there a case for inclusion?

  1. The petitions arguing for inclusion have cited several independent Commission reports that have documented the existence of caste and caste inequalities among Indian Christians and Indian Muslims, noting that even after conversion, members who were originally from SCs continued to experience the same social disabilities.
  2. This was substantiated in the First Backward Classes Commission’s report in 1953, the Report of the Committee on Untouchability Economic and Educational Development Of the Scheduled Castes in 1969, the HPP report on SCs, STs, and Minorities in 1983, the Mandal Commission Report, the report of the Prime Minister’s High-Level Committee formed in 2006, a 2008 study conducted by the National Commission for Minorities, the Ranganath Misra Commission Report and several other studies.
  3. In addition to this, the petitions have argued against the proposition that caste identity is lost upon conversion, noting that even in Sikhism and Buddhism, casteism is not present and yet they have been included as SCs.
  4. Furthermore, the above-mentioned reports argue that caste-based discrimination continues even after conversion, hence entitling these communities to SC status. However, the Union government refuses to accept the reports of the Commissions on the basis that these reports do not have enough empirical evidence to support their claims.

 

Share is Caring, Choose Your Platform!

Recent Posts

  • Darknet

    Definition:

    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.

    Examples:

    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.
    •  

    Cons:

    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.
     
     

    Artificial Intelligence

    Definition:

    AI, or artificial intelligence, refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and understanding natural language.

    Examples:

    • Virtual assistants: Siri, Alexa, and Google Assistant are examples of virtual assistants that use natural language processing to understand and respond to users’ queries.
    • Recommendation systems: Companies like Netflix and Amazon use AI to recommend movies and products to their users based on their browsing and purchase history.

    Pros :

    • Efficiency: AI systems can work continuously without getting tired or making errors, which can save time and resources.
    • Personalization: AI can help provide personalized recommendations and experiences for users.
    • Automation: AI can automate repetitive and tedious tasks, freeing up time for humans to focus on more complex tasks.

    Cons:

    • Job loss: AI has the potential to automate jobs previously performed by humans, leading to job loss and economic disruption.
    • Bias: AI systems can be biased due to the data they are trained on, leading to unfair or discriminatory outcomes.
    • Safety and privacy concerns: AI systems can pose safety risks if they malfunction or are used maliciously, and can also raise privacy concerns if they collect and use personal data without consent.