They're not the same idea. One is about separating instructions and data, the other is about separating different sources of instructions, such that instructions from an unauthorized source are not followed (but instructions from an authorized source are).