I think I'll go back on what I said earlier and advise you deploy VLANs for each subnet instead.
I'd recommend assigning all 10.1.0.0 users to one VLAN (say VLAN2) and 10.2.0.0 users to, say, VLAN3.
You will also need to setup trunking between both 3750's to pass these 2 VLAN's between them. This will allow people on both sites to see other (if on the same IP subnet).
If, later on, you need the subnets to speak to each other, you will need to configure a layer 3 interface on both 3750's for each VLAN. You can then control who can talk to who through the use of ACL's if required.
Example configs follow:
interface FastEthernet0/5
description to PC on VLAN3
switchport access vlan 3
switchport mode access
no ip address
spanning-tree portfast
interface GigabitEthernet0/1
description To Remote 3750
switchport mode trunk
switchport trunk encapsulation dot1q
no ip address
If and when later on, you want to configure a layer 3 interface to allow each set of users to see each other, you can do the following:
interface Vlan2
description User VLAN for 10.1.0.0
ip address 10.1.0.1 255.255.0.0
interface Vlan3
description User VLAN for 10.2.0.0
ip address 10.2.0.1 255.255.0.0
Note each user PC will need to be configured with a default gateway of 10.1.0.1 for instance for this to work. Therefore use whatever default gateway that is already pre-configured on each person's PC for the switch layer 3 interface.