The scope of access depends on the access control policy, the role of user (spatial constraint), and temporal constraint of the access. Consequently, with both valid system identity credential and access credential, users can legally obtain corresponding encrypted data from EHR databases and decrypt them in the legitimate time interval (time bound). We argue that EHR data should be managed with customizable access control along both spatial and temporal dimension.