Encrypt the logs with your public key. Do not keep the private key anywhere near the machines, containing the encrypted logs. Move logs to a remote secure storage (co-located or home-hosted) as soon as Internet connection's available. Assure reasonable amount of electronic and physical security of the storage servers.
Problem solved!