One of your colleagues has a habit of cleaning his desk at the end of the day. This includes trashing a stacks of paper in the trash and sticky notes with his passwords written on it. In this case, he is exposing himself as well as your network and organization to a dumpster diving attack.

Required:
What types of non-technical solutions can you provide to your colleague in order to protect him and your network as well as your organization?