You set it up for auto-desruct say after about 8days so then you have the information you want without the rest of the logs flooding your server/email address.
I would have thought you could remotely disable it, so it could e reactivated for the future.
you can also make spike applications, you can let them rest undetected for as long as you want, then activate them when you know for a fact that the victim has whatever data you want.