Feeds

US judge says University can ignore Christian course credits

Yes, the Bible is fallible

High performance access to file storage

A federal judge has told the University of California that when considering applicants, it has the constitutional right to ignore high school course work grounded in the notion that the Bible is infallible.

On Friday, as reported by the San Francisco Chronicle, Judge James Otero denied claims from a group of Christian high schools and Christian high school students that the 10-campus University had suppressed free speech and discriminated against religious views in rejecting such course credits.

In a 20-page ruling (pdf) Judge Otero, of the Central District of California, says that UC could reject credits as long as it wasn't acting out of "animus" and it had "a rational basis" for those rejections. And he's quite sure the University met both criteria.

One high school course was rejected because its primary text, the Bob Jones University-published United States History for Christian Schools, "failed to adequately teach critical thinking and modern historical analytic methods."

According to one professor on the UC course review committee, the text "instructs that the Bible is the unerring source for analysis of historical events, attributes historical events to divine providence rather than analyzing human action, evaluates historical figures and their contributions based on their religious motivations or lack thereof and contains inadequate treatment of several major ethnic groups, women, and non-Christian religious groups."

In 2005, the Calvary Chapel Christian School of Murrieta, California, five Calvary students, and the Association of Christian Schools International sued UC over its rejection of this Bob Jones-fueled course and other credits. This March, Judge Otero ruled that the University had not exhibited an anti-religious bias in approving high school credits, and with last week's decision, he dismissed the suit outright.

The plaintiffs have already appealed. "It appears the UC is attempting to secularize private religious schools," said their attorney, Jennifer Monk of Advocates for Faith and Freedom. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.