True or False : in order for the data owner and it department to discern the controls necessary to secure data, they need to decide between the authentication method and encryption controls; both are not required.