(1) See
utility program.
(2) Usefulness; fitness for a particular use. Utility is one of the six fundamental components of information security (see
Parkerian Hexad). For example, if data are encrypted and the decryption key is unavailable, the breach of security is in the lack of utility of the data (they are still confidential, possessed, integral, authentic and available).